In this ebook, experts from industry and public sector offer a glimpse at the latest technology developments, share best practice tips and reveal the early value that AI is delivering to agencies across government.
Read More »Wayne LeRiche, the federal civilian field chief technology officer and solutions architect for Palo Alto Networks Federal, discusses how secure access service edge sets a framework for agencies to more easily implement a zero trust architecture.
Listen Now »From data centers through clouds and out to the edge, 5G networks are facilitating innovation at an unprecedented pace. So the question is: How can we align government and industry objectives and leverage all the resources in play to achieve the goal of open, interoperable and secure 5G networks?
Read More »Kevin Tunks, chief architect and national technology adviser for Red Hat, discusses innovative approaches to integrate mobile-centric workloads, secure mobile applications and prepare for 5G.
Mobile applications introduce new security vulnerabilities. Brian Reed, chief mobility officer for NowSecure, describes the risk landscape and shares key steps to a mobile application security program.
Today, mobile devices are prime targets for cybercriminals because they contain more and more sensitive employee, constituent and operational data. Jim Kovach, vice president for public sector at Zimperium, explains why signature-based threat detection is…
In this Q&A, the BlackBerry Sales Engineering team lays out key considerations for state and local governments as their mobility programs expand and morph to take advantage of emerging technologies and accommodate new use cases.
Omar Sandoval, director of government programs for the Center for Digital Government, shares insights on how mobility implementations are changing and how agencies can take advantage of the opportunities these shifts present.
States and localities increase coordination with the federal government.
Hybrid work, multi-cloud deployments and increasingly vulnerable software supply chains are just a few of the cybersecurity challenges that organizations face today. Brandon Shopp, group vice president of product for SolarWinds, discusses cybersecurity…
A key pillar of Zero Trust is identity, which uses capabilities such as multifactor authentication (MFA) to continuously verify the identity of a person or device. Hanna Wong, director of public sector marketing for Keeper Security, discusses how…
The massive shift to remote work highlighted the need to modernize the way state and local governments protect content used in collaboration and workflows. Murtaza Masood, managing director for state and local government at Box, discusses how government…
Organizations that implement a range of best practices are better at closing IT security gaps and making the most of their cybersecurity investments. HPE executives Joe Vidal, master technologist in the company’s Office of North America CTO, and Allen…
Mark Weatherford explores emerging security threats and the changing cybersecurity relationship between states and localities and the federal government.
Cybersecurity affects us all, so we wanted to make this resource inclusive. We are taking the best of what human-centered design and intentional language can teach us about effectively communicating major security shifts that are impacting and will…
With the Army’s Information Technology Enterprise Solutions – Software 2 contract potentially lasting for a decade, the Program Executive Office Enterprise Information Systems knew it had to build in some gates to refresh and relook at the multiple-award…
An interview with Michael Epley, Chief Architect and Security Strategist, Red Hat