Tech

Agency Building with Money Shaking Out of It

Take a Bite Out of Waste, Fraud and Abuse

Identity proofing, or identity verification, refers to the process of gathering data and analyzing signals to confirm an individual’s identity and assess the risk of conducting a transaction with them. Many individuals have extensive digital trails, making it easy to verify their identities with a high level of confidence. But think about younger individuals whoRead… Read more »

Cybersecurity

Best Practices in Zero-Trust Architecture

Agencies need to tackle cybersecurity in a holistic way, relying on zero-trust strategies that shift from complex and inefficient approaches to more streamlined, process-oriented systems. Let’s explore a few ways that you can make that shift with these zero-trust best practices from Richard Breakiron, Senior Director of Strategic Initiatives for the Americas Public Sector atRead… Read more »

Chatbot

What You Need to Know About Bots and CX

Chatbots have grown in popularity for good reason: They’re friendly, helpful, and make information readily available. The benefits are arguably even more significant in government applications. They’ve become a reliable tool for delivering constituent services while saving agencies time and resources. In a recent CX Community of Practice, What You Need to Know About BotsRead… Read more »

How to Use Data, Training to Maximize AI

Data Is the Heart of AI

In the public sector, challenges persist with data sourcing, sharing, training and determining the best ways to use AI. As a result, government agencies continue to tread cautiously while still establishing use cases. The Office of Naval Research is no exception, and Director and Chief Analytics Officer James Valverde Jr. acknowledged it’s impossible to talkRead… Read more »

Animated newspaper with headline that states, "More High-Profile Cyber Attacks".

The App Security Imperative: Closing the Cyber Gap

Application security is imperative in all phases of your agency’s software lifecycle, from design to deployment. That means you must continue to find new and better ways to embed security testing to reduce the risk of cyberattacks and protect your organization’s data. Recently, a rash of high-profile cyberattacks has exploited weaknesses in the elements usedRead… Read more »