content syndication

4 reasons SLTTs need network monitoring systems

by • 1 month ago

Ransomware attacks against state, local, tribal and territorial government entities are on the rise, requiring comprehensive cyberdefense programs that won’t break the bank.

Six ways to combat ransomware with modern network security

by • 6 months ago

State and local agencies are increasingly targeted for ransomware attacks. A new report shares steps that can minimize risk.

7 steps to help prevent and limit the impact of ransomware

by • 10 months ago

When ransomware attacks do strike, every minute counts to notify your organization and investigate quickly, say experts.

Disrupting ransomware with security best practices

by • 12 months ago

Ransomware attacks are a favorite tactic among cybercriminals; the payouts can be big and fast. Two cities in Florida, for example, paid almost $1 million this past summer after their computer systems were paralyzed.

Law enforcement risks being a captive of its video surveillance data, report warns

by • 1 year ago

Rapid growth of state and local law enforcement video footage calls for newer strategies for storing and analyzing data.

How a California county gained cloud-like benefits in its on-premises infrastructure

by • 1 year ago

San Mateo County’s CIO modernized legacy infrastructure using hyperconverged solutions, streamlining deployment and scaling of its data center resources.

Identity hub strategy key to reducing fraud, report says

by • 2 years ago

As online services grow, agencies need to focus greater attention on identity verification and fraud detection tool sets.

Local governments reduce IT costs with enterprise cloud solutions

by • 2 years ago

Legacy infrastructure is a strain on resources and staff hours, but enterprise cloud can reduce costs and improve performance, according to a new report.

Tips to improve cybersecurity with a data-analytics nerve center

by • 2 years ago

New report shows how coordinated, data-driven security platforms can help state IT leaders fortify cybersecurity defense against potential threats.