Cybersecurity Stays Front-of-Mind in 2023

Federal Data Protection and Cloud Security Federal agencies have taken the lead in the public sector’s adoption of cloud computing. It has provided many benefits, including flexibility for applications, cost savings as legacy systems have been phased out, and empowering customers in their interactions with agencies – but it also has opened new methods for cyberattacks, […]

Building A Better Case Management System

For government agencies, case management – delivering services to people and businesses – is the heart of their mission. In almost all cases, however, case management systems have gotten more complicated, more difficult to manage, and more expensive. Agencies today depend on legacy, siloed systems that have changed through kludges, “an ill-assorted collection of parts […]

Vision 2023: Transforming Ohio Through Technology

The technology revolution that has reshaped consumer markets has now arrived at the state level. Case in point: the State of Ohio, where state, local and educational organizations are moving quickly to integrate innovative technologies that can drive better decision-making while lowering the cost of ownership for IT systems. Incorporating new technologies also creates opportunities […]

Powering Innovation Through Technology, 5G: Transforming Government Operations for the Digital Age

The spread of 5G – fifth-generation mobile communications – across all levels of government is being accelerated by its usefulness in high-speed data transmissions and flexibility in customizing network applications. And the range of applications by government agencies made possible by 5G may only be limited by one’s imagination. Some of the innovations supported by this wireless standard […]

Powering Innovation Through Technology, 5G: Transforming Government Operations for the Digital Age

The spread of 5G – fifth-generation mobile communications – across all levels of government is being accelerated by its usefulness in high-speed data transmissions and flexibility in customizing network applications. And the range of applications by government agencies made possible by 5G may only be limited by one’s imagination. Some of the innovations supported by this wireless standard […]

Meeting the Requirements of a Mixed IT Environment

Beginning in the 1990s, as computer applications became commonplace and every worker was issued a desktop unit, agencies slowly recognized that custom hardware and software, such as mainframes with unique software, were doomed – they were too complex and expensive to develop or maintain, and they couldn’t incorporate technological changes. Because the agencies were slow to […]

Identity – One Critical Element of CISA’s Zero Trust Maturity Model 2.0

When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as […]

Tackling the Necessity of Converged IT/OT Security

Federal agencies take seriously the cybersecurity of their IT systems. They must observe numerous federal policies and programs, from Executive Order 14028 on down. Many agencies are far less aware of the need to strengthen the security of their operations technology (OT), the equipment that runs many kinds of systems, including healthcare. Historically, that was […]

Meeting the Requirements of a Mixed IT Environment

Beginning in the 1990s, as computer applications became commonplace and every worker was issued a desktop unit, agencies slowly recognized that custom hardware and software, such as mainframes with unique software, were doomed – they were too complex and expensive to develop or maintain, and they couldn’t incorporate technological changes. Because the agencies were slow to […]

Vision 2024: The Future of Technology in Government – San Jose, CA

Government at all levels is moving as quickly as possible to integrate new solutions and overhaul processes that need streamlining. At the same time, officials are keeping close watch on AI and other emerging technologies, wary of the law of unintended consequences. For instance, in early September California Gov. Gavin Newsom signed an executive order […]

CyberSmart 2024: Cybersecurity Faces a Rapidly Changing Landscape Washington DC

Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other […]

Navigating the Complex Landscape of Modern Threats, Zero Trust Strategies for Enhanced Security

The cat-and-mouse game between threat actors and cybersecurity professionals continued unabated in 2023, with new threats designed to avoid detection. Many of these threats are new takes on old ones, such as “leveling up” invoice fraud. And ransomware attacks are evolving; rather than encrypting victims’ data, they are straightforwardly stealing the information and extorting payment […]

Scroll to Top