Agencies should fully understand how to embed information security into IT best practices and amongst all users to protect agency data.
Posts Tagged: IT
State or local governments can turn to SOC-as-a-service to tap into a deep reserve of cyber expertise and threat intelligence.
In this post, we talk about what most people ignore — the risks of AI. Prior to deploying the technology across your organization, it’s critical to identify and understand these risks and have a plan in place to mitigate them.
There’s no doubt that the future will be augmented by AI, and organizations and society will benefit. Implementation is happening slowly — as it should. While AI offers promise, it’s not an endeavor to undertake without preparation.
In most IT contracts the first phase requires the contractor to develop a set of requirements. If the requirements weren’t known when the Request for Proposal (RFP) was written, how can we expect a valid bid in the contractor’s proposal?
GovLoop hosted a panel Wednesday afternoon about the shared burden agencies face in IT modernization and the best steps agencies can take going forward.
Penned in the 1960s, the “Fifty Nifty United States” song is a favorite of 3rd grade classrooms across the country. But is it’s mantra true, that every state really is unique, and if so, does that uniqueness extend to IT.
Journalist Scott Fulton III describes fifth-generation wireless, or 5G, as “a capital improvement project the size of the entire planet.” He’s not wrong. And it’s coming fast.
Achieving security is still a concern in hybrid cloud environments. The answer is to shift to a model of cloud security where identity is the new firewall, devices are the new perimeter, and flexibility is built in to the approach.
Considering how often it’s discussed, digital transformation is still a difficult term to pin down. In a recent webinar, SBA CIO Guy Cavallo discussed how government agencies to transform to fit the changing digital landscape.