Cybersecurity: A Menu of State Priorities
No state or local entity should assume that it’s too small or innocuous to undergo a cyberattack. Here’s how North Dakota prepares.
No state or local entity should assume that it’s too small or innocuous to undergo a cyberattack. Here’s how North Dakota prepares.
At the state and local level, adopting AI remains only one of a long list of IT priorities. Read how Burlington, VT is approaching it.
Discover how workplace culture issues could be costing your organization millions. From exclusive cliques to high turnover rates, learn the hidden dangers lurking in your office and the powerful strategies to transform your workplace. Don’t let your bottom line suffer – Find out why and how to stop the talent drain! Click to read the… Read more »
Your best ideas may not be your own — and that’s a strength. Discover how collaboration and crowdsourcing in public institutions are driving innovative solutions by tapping into diverse perspectives and collective brainpower.
Helium has emerged as a promising contender in the quest for clean energy solutions and plays an important role in quantum computing and other industries. Here are helium basics that government employees should know.
This report explores multi-cloud adoption in agencies, highlighting the benefits and challenges of implementing these environments.
Learn more about the security considerations agencies need to keep in mind as they continue to adopt video conferencing solutions.
Sure, November is typically a busy month, with Daylight Savings wreaking havoc on us all and the hecticness of kicking off the holiday season. But making time for professional development shouldn’t get pushed to the back burner. Check out the full list of November online trainings below, and remember, all sessions are recorded — soRead… Read more »
In state and local government, where the ability to deliver high-quality programs hinges on the close collaboration of teams across an organization.
DHS has developed the Unified Cybersecurity Maturity Model, a framework that allows the agency to tie the investment dollars to the cybersecurity of programs and their component systems.