Reality Check: Counties Assess Their Cyber Readiness
From the types of attacks that take place, constantly increasing vulnerabilities, and growing automation and digitization, it’s crucial that governments monitor their security.
From the types of attacks that take place, constantly increasing vulnerabilities, and growing automation and digitization, it’s crucial that governments monitor their security.
Moving data to the cloud helps eliminate silos that can make constituent services both fragmented and frustrating.
North Carolina takes a whole-of-state approach to cybersecurity to help share expertise with agencies that may lack the resources to defend themselves.
Community emergency responders can have a hard time finding the caller on sprawling bases and agencies. Here’s a tool that can help.
To get buy-in for cybersecurity initiatives, don’t talk tech — speak simply.
GovLoop spoke to federal and state thought leaders about how their agencies are successfully collaborating and training virtually.
Adopting a DevOps approach can bear fruit quickly: Agencies can develop better quality software, faster. But DevOps is really a journey, and there are four steps, experts say, to developing a DevOps program that’s maximally effective.
Micro-segmentation is an important step toward a zero trust-based cybersecurity. Here are some best practices.
When it comes to cybersecurity, “The question is not will you be attacked, but what will be the consequence.” Here’s how to prepare.
For many supervisors, giving an annual performance review is like going to the gym: They dread doing it and it’s sometimes painful when they do, but they know it must be done. There’s no way to take all the stress out of performance reviews. But in a recent NextGen online training, two speakers from theRead… Read more »