Tech

Move Over Lorax, There’s A New Tree Crusader In Town

“I am the Lorax. I speak for the trees. I speak for the trees, for the trees have no tongues. I am the Lorax who speaks for the trees, which you seem to be chopping as fast as you please!” – Dr. Seuss, The Lorax. It may sound a little strange, but trees play aRead… Read more »

Situational Awareness and Prioritization Are Key to Cybersecurity

When it comes to cybersecurity, engineering your way to a more secure environment is a very important step. But according to John Banghart, Director of Federal Cybersecurity at the National Security Council, technology isn’t the only solution. “I want to focus on people and priority, as opposed to technology,” Banghart said. He was speaking atRead… Read more »

5 Steps to Take Advantage of the Next Natural Resource: Data

By Amy DeWolf Coined “the next natural resource,” big data has endless possibilities to improve government operations, lower costs, reduce waste, fraud and abuse, increase efficiencies, and enable agencies to have a holistic view of citizens. From tax agencies to social programs, government organizations are benefiting from looking at their data, all of their data,Read… Read more »

Cybersecurity: Experts’ Concerns — and Advice

At GovLoop’s latest live event on cybersecurity, a panel of experts gathered to discuss the myriad challenges that the government and organizations face when it comes to being prepared for cyberattacks. But it wasn’t all doom and gloom — each participant also offered up concrete tips on what you can do today to start creatingRead… Read more »

Your Top Digital Government Questions – Answered

Last week, GovLoop, Accenture and Pegasystems hosted an online training on the future of digital government. And an especially important part of that training was the Q & A session between panelists and attendees, since it provided a live, interactive forum for the exchange of ideas and solutions. You can listen to an archived recordingRead… Read more »

How being TACIT Can Help Your Cybersecurity Efforts

Cybersecurity has emerged as a key priority for information technology leaders. From the top levels of government, pressures are increasing to protect U.S. critical infrastructure and collaborate across sectors. But being secure isn’t just about thwarting attacks – it’s also about being prepared to react once you fall victim to a cyberattack. Dealing with cybersecurityRead… Read more »

What Drives Government Innovation? Startups

Government is known for many things—but innovation typically is not one of them. That doesn’t mean it’s not happening, though. In fact, throughout the country there are people in and around government thinking outside the box and bringing innovation to their communities. These new ideas are helping to bridge technology gaps, increase transparency, provide essentialRead… Read more »

4 Reasons to Attend Our Mobile Security Event

Smartphones. Tablets. BYOD. Oh my! Now, you have access to your data at all times, 24/7. You’re no longer disconnected when you leave your office. It’s obvious to anybody how far our society has come with mobile technology and the unique opportunity it presents to transform the way government operates. But in order to capitalizeRead… Read more »

What Can We Learn From a Decade of Cyber Crime?

Verizon’s annual Data Breach Investigations Report is one of the most hotly anticipated cybersecurity publications of the year. Based on 1,367 data breaches and more than 63,000 security incidents in 95 countries, the Data Breach Investigations Report paints a realistic picture of the current state of cybercrime. Bryan Sartin, director of the Risk Team atRead… Read more »

Procurement Summit – How to Empower the CIO

Twenty years ago the government created the role of the Chief Information Officer. But now, two decades later, there’s still a real disconnected between procurement and IT. Procurement systems simply cannot keep up with the pace of the technology. Need proof? Just look at the rollout of healthcare.gov. Many experts say the wrong contractors andRead… Read more »