govloop logo link to homepage

  • Training
  • Resources
  • Video
  • NextGen
  • Blog
    • Community Posts
    • Career
      • Human Resources
      • Leadership
      • Policy
      • Professional Development
      • Project Management
    • Communications
      • Citizen Engagement
      • Digital Government
      • Social Media
    • Tech
      • Acquisition
      • Analytics
      • Artificial Intelligence
      • Big Data
      • CIO Conversations
      • Cloud
      • Cybersecurity
      • Emerging Tech
      • GIS
      • IT Modernization
      • Mobile
      • Open Data
    • State and Local
  • About Us
    • Partner With GovLoop
  • Register
  • Log In

Digital Government

3 Pillars of a Modern, Digital Government

We surveyed more than 130 government employees about 21st Century IDEA and their prioritization of CX. Here’s what they said.

February 20, 2020
Avatar photo
Nicole Blake Johnson
One Comment

Tags: 21st Century IDEA, servicenow

Cybersecurity

Tech Transformation Strategy: 5G

The futuristic world that movies foretold hinges on a new faster, broad-spectrum wireless network. But as 5G rolls out, security concerns roll in. This time, the Cybersecurity and Infrastructure Security Agency (CISA) is one step ahead in protecting its prized assets.

February 20, 2020
Isaac Constans
Leave a comment

Tags: 5g, Bill Kolasky, CISA, Tech Transformation Strategies 2020

Leadership, Project Management, Tech

Teaching Career Govies New Tricks

Many agencies struggle to transform their technology because they don’t ease their people into the process.

February 19, 2020
Avatar photo
Mark Hensch
Leave a comment

Tags: Box!, DDS, technology

GIS, Policy

Scooters, Begone or Be Regulated With GIS

Nashville is one of many metropolitan municipalities looking to manage the influx of micromobility — that is, scooters. These vehicles and others like it have cropped up almost overnight with city officials scrambling to regulate them.

February 19, 2020
Avatar photo
Pearl Kim
2 Comments

Tags: Esri, GIS, Keith Cooke

Big Data, Leadership, State and Local

What the State CDO Network Director Wants You to Know About Data

Chief data officers fill an executive post tasked with leveraging data as a strategic asset, but what precisely and practicably does that mean?

February 19, 2020
Avatar photo
Pearl Kim
One Comment

Tags: beeck center, CDO Conversations, Chief Data Officer, State CDO Network, Tyler Kleykamp

Citizen Engagement, Cloud

How to Solve the Challenge of Legacy Citizen Identity

Customer identity and access management (CIAM) is a complex undertaking, requiring agencies to manage user logins, self-service registration and identity databases at scale.

February 19, 2020
Avatar photo
Mark Hensch
Leave a comment

Tags: CIAM, customer identity and access management, CX, IAM, identity and access management, Okta, Peter Zavlaris

Cybersecurity, DoD

Tech Transformation Strategy: Zero Trust

The Air Force is in the vanguard of major organizations that are looking to something called zero trust architecture. GovLoop sat down with William Marion, the service’s Deputy Chief Information Officer (CIO), to learn more about its strategy.

February 19, 2020
Avatar photo
John Monroe
Leave a comment

Tags: air-force, Tech Transformation Strategies 2020, William Marion, Zero Trust

Digital Government

3 Pillars to Digital Government

The 21st Century Integrated Digital Experience Act (IDEA) recently celebrated its one year anniversary. The goal of the legislation is to improve the way citizens interact with the federal government.

February 18, 2020
Jonathan Alboum
2 Comments

Tags: 21st Century IDEA, digital transformation, servicenow

Cybersecurity, IT Modernization

Why Do Agencies Need Enterprise Risk Management?

As the government’s complete reliance on digital technologies expands, it becomes harder to secure the growing network of new devices, IT systems and cloud solutions. In short, the network is the mission.

February 18, 2020
Avatar photo
Stephanie Kanowitz
Leave a comment

Tags: Enterprise Risk Management

Cybersecurity, Digital Government, Leadership

The Top Obstacles to Stopping Federal Ransomware

This blog is the third of six upcoming articles from GovLoop about the growing cybersecurity threat known as ransomware.

February 18, 2020
Avatar photo
Mark Hensch
One Comment

Tags: ransomware, ThunderCat Technology, Veritas Technologies LLC

  • ←
  • 1
  • 2
  • 3
  • …
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • …
  • 1,252
  • 1,253
  • 1,254
  • →

Recent Articles on GovLoop

  • Disjointed Data and IT: What That Means and How to Fix It
  • Scaling Up Data Governance for AI 
  • Understanding Your Constituents’ Digital Experience 
  • About AI: Insights You May Have Missed
  • Protecting Operations Takes a Meeting of the Minds 
  • New Year, New Online Training Opportunities
  • Every Project Needs a Plan
  • Try a Zigzag Career Path
  • A 21st-Century Education in Ohio Prisons
  • How to Be a Nimble Employee
govloop grey logo link to homepage

© 2026 GovLoop

  • Help
  • Privacy Policy
  • Terms of Service
  • Sitemap
  • Do Not Sell My Personal Information
x