Insider Insights

  • Cybersecurity’s next phase: Cyber deterrence

    Cybersecurity’s next phase: Cyber deterrence

    We can strengthen cyber deterrence by improving cybersecurity, employing active defenses and establishing international norms for cyberspace.

  • 3 ways to strengthen security with software supply-chain automation

    3 ways to strengthen security with software supply-chain automation

    Automation can give developers confidence in open-source components’ security, licensing and quality.

  • What to consider in a modern storage network

    Stop the reliance on legacy IT: What to consider in a modern storage network

    To support digital transformation, today's agency networks must provide reliability, high-performance access and secure modern storage.

  • Greater than a wall: Building border security technology

    Greater than a wall: Building border security technology

    Biometric data capture, ID verification and algorithmic intelligence technologies will enhance the coverage, responsiveness and flexibility of border protection efforts.

  • The storage challenge for body-worn camera video

    The storage challenge for body-worn camera video

    Agencies considering implementing a body-worn camera program need a scalable, secure data storage infrastructure.

    Comments: 1
  • Information management extends beyond digital records

    Information management extends beyond digital records

    An agency’s overarching information management program includes compliance, classification, retention and employee training.

  • How to distill the VA

    How to distill the VA's strategic plan into action

    Agencies and contractors can take a page from the Department of Veterans Affairs’ plan to revamp the way it delivers services.

  • How secured printing can control data leaks

    4 ways to avoid data risk from printing

    Secure document management minimizes the exposure of sensitive printed, faxed or scanned data to anyone but the personnel who have a “need to know.”

  • What you can do today to protect against quantum computing

    What you can do today to protect against quantum computing

    Agencies must be ready to protect sensitive government data from the potentially devastating hacking threats that loom just beyond the horizon.

  • Can government agencies ever unmask the insider threat?

    Can government agencies ever unmask the insider threat?

    Allegations against contactor Harold Martin are a critical reminder that protecting against insider threats requires more than employee awareness.

inside gcn

  • Reducing incarceration with technology (ShutterStock image)

    Reducing incarceration with technology


More from 1105 Public Sector Media Group