Insider Insights

  • fusion center

    Strengthening cyber defenses through fusion center engagement

    To measurably reduce cyber vulnerability, state and local governments must interact regularly with fusion centers and encourage more private companies to share information.

  • accessibility (ShutterStock image)

    Prepare now for upcoming website accessibility mandates

    Although accessibility rules and compliance enforcement are rapidly evolving, municipalities can keep pace with the technology and expertise to deliver effective, transparent and accessible websites.

  • Accelerating modernization through microservices (ShutterStock image)

    Accelerating modernization through microservices

    When implemented correctly, microservices architecture can dramatically accelerate and simplify modernization of complex systems.

  • old wine bottles (ShutterStock image)

    The value of unlocking legacy applications

    Rather than viewing legacy IT as a creaky old system that should be replaced, it’s worth looking instead at modernizing how users interact with it.

  • President Trump

    Lessons on emergency preparedness from the presidential inauguration

    Fast, secure and reliable communication is critical for local emergency managers and law enforcement agencies responsible for major events.

  • How to control the expanding government network (ShutterStock image)

    How to control the expanding government network

    Network performance and bandwidth monitoring solutions can help government IT pros keep users productive and systems secure.

  • The death of bimodal IT: Why only one speed (fast) will do (ShutterStock image)

    The death of bimodal IT: Why only one speed (fast) will do

    Speeding up the mainframe development environment so that developers can toggle between mainframe and more modern platforms easily and fluidly will help agencies meet service delivery goals and attract new talent.

  • Today’s ransomware could become tomorrow’s security nightmare (ShutterStock image)

    Today’s ransomware could become tomorrow’s security nightmare

    Any weak link breached by ransom-seeking hackers can also be exploited by bad actors with more malicious goals.

  • Open source vs. COTS: 8 integration considerations

    Open source vs. COTS: 8 integration considerations

    When it comes to selecting a mission-critical solution that can impact an entire agency, it’s important to consider the benefits and drawbacks of the options.

  • Data insights, not ownership, will unleash innovation

    Data insights, not ownership, will unleash innovation

    The insights derived from government, commercial and public data, tools and analytics will deliver better public services with lower cost, less risk and more trust.

inside gcn

  • cloud-based security (Omelchenko/Shutterstock.com)

    7 reasons why cloud-based security makes sense