A Guide to Mobile Security Threats
Is your agency aware of the four main types of mobile threats? Here’s a closer look and a few tips for reducing risk.
Is your agency aware of the four main types of mobile threats? Here’s a closer look and a few tips for reducing risk.
Learn how updating your human resource tools and technology can help agencies rise to the challenge of getting (and keeping) new hires.
There’s no easy way to explain quantum computing without getting deep into the kind of math that only quantum physicists understand. But here’s a brief overview that makes quantum computing understandable for the rest of us.
Discover how your agency can get the technical details of zero trust right by including network segmentation.
“Humanity-centered design” goes beyond “human-centered design” to look at the bigger picture surrounding applications. Here’s how that can change your approach.
It matters whether someone has a positive or negative experience transitioning from traditional, face-to-face interactions with agencies to more digital outreach. The right implementation can help.
Online training sessions for June are here – check out what’s available to learn this month.
This blurb describes discoveries by Wind Creek Hospitality (WCH) during its tech modernization journey.
A CIO’s busy schedule can sideline the critical task of technology scouting. Setting vendor “office hours” is a way to get the information without wasting time.
Here’s a quick use case of how Monroe County, Georgia, successfully left its traditional hub-and-spoke security architecture behind.
Notifications