Identity-Centric Strategies Drive Government Security
During a recent webinar, government and industry leaders discussed key steps agencies can take to implementing identity-centric security.
During a recent webinar, government and industry leaders discussed key steps agencies can take to implementing identity-centric security.
Cybersecurity solutions based on perimeter defense are no longer adequate. Cloud, the explosion of IoT endpoints, and telework call for zero trust.
GovLoop polled its readers for their thoughts on “quiet quitting” and “quiet firing” — what they are, what causes those circumstances, what agencies can do to make things better and whether those situations even exist. The survey results were intriguing, and said a lot about the role managers play.
Zero trust isn’t just about technology. It also requires a change in mindset. Here’s how to take a holistic approach.
When it comes to measuring community engagement, San Antonio has found numbers only tell part of the story.
The “digital divide” is about much more that broadband access. It’s also about access to devices, and the knowledge to use them. Here’s how North Carolina addresses it all.
Cloud technology can lead to cost savings, greater efficiency and less burdensome workloads. But many agencies have slow-walked their journeys to the cloud, and cloud migrations can, in fact, be quite complicated. Here are three things agencies should consider when contemplating a cloud transition.
Operational technology and industrial control systems keep essential services running. But it can be hard to find the workforce to protect them. Here are some tips.
In a Connecticut city, virtual community outreach was essential to designing a riverfront everyone could enjoy.
Workforce transformation expert Mika Cross shares how we can treat each other with civility and respect in a remote workplace.