Insider Insights

  • encryption key (Feylite/

    Using encryption to help fight data breaches

    Unified key management solutions offer a centralized approach and work across clouds, both on-premises and in data centers.

  • mobile phone and city (ponsulak/

    Delivering citizen-centric state government

    State CIOs can take advantage of cloud, business intelligence and automation tools to meet the increasing expectations of a demanding citizenry.

  • Eisenhower speaking to troops (American Battle Monuments Commission)

    From Eisenhower to AI: What human capital management is learning from the past

    An extensive database powered by AI can help agencies accurately evaluate job candidates, assess their “behavioral DNA” and issue an instant report to human resource managers.

  • laptop user typing (Vladyslav Starozhylov/

    A human-centric approach to better cybersecurity

    Automated and adaptive security response based on how individual users interact with data can boost security without imposing blanket restrictions.

  • cloud migration (Paladjai/

    3 considerations before moving to the cloud

    To guarantee that migration leads to improved performance, agencies must analyze the workloads, establish baselines and prioritize the applications that will most benefit from the move.

  • big data AI health data

    Putting AI to work for veterans’ health

    Artificial intelligence can be leveraged to predict future health complications and the interventions that will reduce risk, thereby greatly increasing veteran health and fiscal efficiency.

  • multiple clouds (Eny Setiyowati/

    Open infrastructures give agencies cloud freedom

    Open and flexible cloud infrastructures can meet agencies' needs and support them as they evolve, no matter which cloud provider -- or providers -- they elect as partners.

  • cloud backup (

    Consequences of ransomware heat up in Atlanta

    Continuous data protection can help agencies shield themselves from the significant damage and costly recovery from cyber attacks.

  • innovation (PopTika/

    Securing innovation at state and local agencies

    As state and local agencies adopt automation, cloud and IoT technologies to improve their services and citizens' experience, they must also incorporate automated defenses to mitigate associated risks.

  • secure system (vs148/

    Trust shouldn't be cheap in government IT systems

    To protect the integrity of the election process, agencies must adopt a zero trust security posture.

inside gcn

  • russian email hack (Bakhtiar Zein/

    Mueller indictment details hacks on state election systems