identity authentication

Enhancing the security posture for state and local government

by • 2 months ago

With ransomware attacks on the rise, state and local leaders need to look at modern identity and access management tools to mitigate identity-based security risks.

How agencies can mitigate cyber risks from unmanaged devices

by • 3 months ago

Though agencies loosened “bring-your-own-device” policies last year, they can still stay ahead of cyberthreats by integrating dynamic access policies.

Four ingredients to a successful security strategy

by • 5 months ago

It’s critical that public sector security systems and policies can protect against new cyberthreats. What types of attacks are on the rise and can IT leaders do about it?

Using modern authentication controls to mitigate fraud risks

by • 5 months ago

Fraud can quickly drain state and local agency resources. However, with modern authentication controls, CIOs and CISOs can mitigate fraud and security risks.

Using modern identity tools to limit fraud, waste and abuse

by • 6 months ago

Digital services for citizens are increasingly important. By using cloud-based identity tools, agencies can mitigate abuse of funds and help those most in need.

When the pandemic broke the traditional security model

by • 7 months ago

Why agency leaders need to reset their assumptions about authentication and look to a better model for security across their network.

Simplifying the security stack to support long-term telework

by • 12 months ago

Government CISOs need to address the strain on their IT resources as they meet the security needs of agency workers connecting from home, say IT leaders in a podcast.

Coronavirus pandemic sparked modernization, future growth in states

by • 1 year ago

Though state and local government agencies scrambled to meet the demands of a remote workforce, the effects of IT modernization will lay the groundwork for future successes.

IAM solutions that help deter ransomware and cyberthreats at agencies

by • 2 years ago

State and local agency CIOs can take advantage of modern identity and access management tools to mitigate cyberthreats against critical data, report says.

TwitterFacebookLinkedInRedditGmail