16 Holiday Gift Ideas Your Remote and In-Person Coworkers Will Love
This gift guide is filled with lots of fun and meaningful treats for your hard-working government colleagues that don’t violate the ethics rules.
This gift guide is filled with lots of fun and meaningful treats for your hard-working government colleagues that don’t violate the ethics rules.
A cybersecurity expert highlighted three methods that are key to ransomware protection: exploit blocking, machine learning and indicators of attack.
The most efficient way to solve the problems of complexity, visibility and usability is through comprehensive, automated monitoring of applications, infrastructure and cloud resources.
GovLoop highlights some of the best opportunities available on USAJobs.com in a blog post each week.
Now, the challenges around remote work is not so much a technology issue but a policy one, said Rob Beutel, the Air Force’s Deputy Chief Information Technology Officer.
Just like when adding any new decision-maker to an organization, officials need to build a base of trust before rolling out an AI system in the real world.
An industry cybersecurity expert gave agencies three pointers for protecting themselves with zero trust cybersecurity, which assumes everyone and everything on IT networks is potentially threatening.
Individual development plans allow us to assess what we’d like to achieve and improve. Here’s how to create an effective one.
The work will begin for a new administration but it continues for public servants. So we’ve compiled sage words for this moment and the journey ahead.
It’s time to start thinking about (and getting excited for!) the 2021 NextGen Government Training Summit. Join us virtually August 4-5, 2021.