Insider Insights

  • cloud encrypted gateway

    Finding FedRAMP’s missing piece

    Cloud encryption gateways provide agencies a critical layer of security in moving data to the cloud.

  • Databases in the cloud: dark cloud or silver lining?

    Databases in the cloud: dark cloud or silver lining?

    Concerns over performance, availability and control are keeping databases out of the cloud.

  • Reaping the benefits of net monitoring and IT consolidation

    Reaping the benefits of net monitoring and IT consolidation

    For the University of Maryland University College, data center consolidation and cloud migration was made easier with hybrid network monitoring.

  • How SD-WAN can power federal digital transformation

    How SD-WAN can power federal digital transformation

    To realize the vision of federal IT modernization and digital transformation, the underlying network infrastructure must evolve alongside innovations in application development and service delivery.

  • Map-based tools smooth early voting

    Map-based tools smooth early voting

    Geographic information systems are helping improve the voting experience for both voters and election officials.

    Comments: 1
  • The outbound VDI: Internet access while protecting enterprise systems

    The outbound VDI: Internet access while protecting enterprise systems

    An outbound virtual desktop infrastructure can significantly reduce the risks of threats to internal corporate systems and data while maintaining the benefits of internet access.

  • digital services governance

    Governance critical as digital services expand

    Governance can lay the groundwork for greater innovation, cross-agency collaboration and ultimately a well-executed approach to serving citizens’changing digital needs.

  • Breaking down cybersecurity communication barriers

    Breaking down cybersecurity communication barriers

    Effective risk management and decision making is about being able to translate the conversation from what’s happening with the technology to how it impacts the mission.

  • Can the phishing epidemic be stopped?

    Can the phishing epidemic be stopped?

    Even extensive training is unlikely to transform ordinary workers into hyper-vigilant phishing detectives.

    Comments: 1
  • Prioritizing vulnerabilities to fight cyberthreats

    Prioritizing vulnerabilities to fight cyberthreats

    To stay ahead of adversaries, federal IT decision makers must step back from their day-to-day routines and prioritize their vulnerabilities.

inside gcn

  • Reducing incarceration with technology (ShutterStock image)

    Reducing incarceration with technology


More from 1105 Public Sector Media Group