Preparing for Post-Quantum Cryptography
Quantum computing poses one clearly identified threat — the ability to compromise nearly all current digital encryption. Here’s how to prepare today.
Quantum computing poses one clearly identified threat — the ability to compromise nearly all current digital encryption. Here’s how to prepare today.
The temperatures may be cooling down, but the opportunity to learn new skills is heating up with October’s online training line-up. From agentic AI to the do’s and don’ts of delegation, there’s something for everyone. We’ve also got the NextGen Government Virtual Training Summit that you won’t want to miss – it’s a full dayRead… Read more »
As a supervisor, one-on-one meetings are one of the most powerful tools in your toolbox. Yet, managers and direct reports alike tend to dread them. Why is this? When did one-on-ones get such a bad reputation? It’s time for a reset on these meetings. Below are a few key takeaways and the recording with JeanineRead… Read more »
The NextGen Government Training Virtual Summit is just around the corner, and it’s time to start thinking about which breakout sessions you’d like to attend! During the free, all-day online professional development seminar on Wednesday, Oct. 22 from 10 a.m.-4 p.m. ET/7 a.m.-1 p.m. PT, there are two opportunities to attend breakout sessions, with topicsRead… Read more »
In this video interview, Daniel Fager of Qlik explains the elements of a strong data foundation and how they help maximize the value of your data.
With a federal government shutdown on the horizon, GovLoop’s General Manager & Vice President Doug Mashkuri offers a few words of support, and links to helpful resources.
As uncertainty around a federal shutdown mounts, we have compiled helpful resources below. We will continue to add links to this page as the situation develops and more information is made available.
Confronting a growing number of alerts and tighter resources, government agencies must evaluate their existing security deployments in endpoint prevention, detection, and response for opportunities to reduce costs and leverage the right technology for more efficient endpoint security. Let’s explore a few best practices that can drive new levels of security efficiency in endpoint securityRead… Read more »
The basics of quantum computing can be difficult to understand — and even more difficult to remember. Here are five key points to keep in mind, in commonsense language.
One off-the-cuff comment. A media firestorm. And a leadership lesson you won’t find in any textbook. Discover why public communication isn’t just PR — It’s strategy.