Insider Insights

  • How to control the expanding government network (ShutterStock image)

    How to control the expanding government network

    Network performance and bandwidth monitoring solutions can help government IT pros keep users productive and systems secure.

  • The death of bimodal IT: Why only one speed (fast) will do (ShutterStock image)

    The death of bimodal IT: Why only one speed (fast) will do

    Speeding up the mainframe development environment so that developers can toggle between mainframe and more modern platforms easily and fluidly will help agencies meet service delivery goals and attract new talent.

  • Today’s ransomware could become tomorrow’s security nightmare (ShutterStock image)

    Today’s ransomware could become tomorrow’s security nightmare

    Any weak link breached by ransom-seeking hackers can also be exploited by bad actors with more malicious goals.

  • Open source vs. COTS: 8 integration considerations

    Open source vs. COTS: 8 integration considerations

    When it comes to selecting a mission-critical solution that can impact an entire agency, it’s important to consider the benefits and drawbacks of the options.

  • Data insights, not ownership, will unleash innovation

    Data insights, not ownership, will unleash innovation

    The insights derived from government, commercial and public data, tools and analytics will deliver better public services with lower cost, less risk and more trust.

  • digitization of documents (ShutterStock image)

    Untethering internal information from paper

    Digitization of internal information -- training documents, research materials, manuals or archives – can help agencies improve efficiency and better meet their missions.

  • controlling risk (ShutterStock image)

    Why government agencies must embrace CDM

    The risk-based approach of the Continuous Diagnostics and Mitigation program shifts cybersecurity from solely a technical issue to an everyday business priority.

  • identity and access management

    Resolving trust issues in collaborative work ecosystems

    Contextual access-control solutions grant access to resources according to context-based security policies.

  • Using deception technologies to thwart attacks and reveal targets

    Using deception technologies to thwart attacks and reveal targets

    Using intelligent deception, IT security teams can not only deflect attacks, but they can also detect what invaders are looking for and ultimately identify the cyber criminals and stop the attack.

  • Explaining cybersecurity threats in a decision-maker context (ShutterStock image)

    Explaining cybersecurity threats in a decision-maker context

    Cyber professionals must help decision makers understand the nature, impact and context of vulnerabilities so they understand the available courses of action, their relative costs, impacts and benefits.

inside gcn

  • Does broadband speed always matter?

    Does broadband speed always matter?


More from 1105 Public Sector Media Group