Insider Insights

  • secure mobile medical data

    Endpoint security: Keeping virtual desktops safe for the remote workforce

    Advanced endpoint management lets agencies secure virtual applications and desktops while giving users access to the data and applications they need.

  • worker with laptop and phone (GaudiLab/

    Improving case management in local government

    Even without access to digital tools for personalized citizen services, local government can improve the case management process without large investments.

  • cloud security

    A new model for government cloud security

    Security insight means constant awareness not just of data and applications but also how they are functioning within the cloud environment.

  • barcode (Shutter_M/

    Barcode technology still delivers efficiencies

    Barcodes save agencies time and reduce costs by efficiently tracking and managing assets, streamlining workflows and reducing human error.

  • man with umbrella clouds (Maksim Shmeljov/

    Mitigating government's risks in a cloud-based world

    While the adoption of cloud technologies does not remove IT responsibility for data protection, the shift may obscure areas of risk.

  • hybrid IT

    Hybrid IT and data security musts

    The key to an agency's successful cloud or hybrid IT implementation is to understand and maximize its cloud security posture in advance of the move.

  • connected clouds (Shai_Halud/

    Catching up with an interconnected federal cloud

    Blending an interconnection-first approach with a cloud-first strategy enables digital users to gain access to multiple clouds from any location or any device.

  • application modernization

    Modernizing applications in light of the cyber executive order

    Cloud-based, platform-as-a-service technologies can deliver more secure and less expensive systems.

  • factcheck key (By David Carillet/

    As the MGT Act rolls forward, it's time to debunk mainframe myths

    Modernizing government technology should not mean replacing the dependable mainframe powerhouses that process increasingly complex workloads.

    Comments: 1
  • Stalking the insider threat

    Protection from insider threats

    Privileged account management is critical in keeping agency networks secure.

inside gcn

  • contemplating the future (SFIO CRACHO/

    Governors prep for disruptive technology