IT security

Oklahoma CISO discusses security and single identity strategies for citizen services

by

Matt Singleton praises Oklahoma’s foresight into supply chain security and identity measures that are helping the state stay ahead of modern threats.

N.C. cybersecurity strategy leverages legislative and workforce development measures

by

As a result of pandemic, the North Carolina has ramped up cybersecurity initiatives and workforce development programs, says Rob Main, the state’s chief risk officer.

Georgia’s CISO on strategies to overcome workforce gaps in security

by

David Allen shares the state’s approach to expand its security workforce, including leveraging young talent out of school and partnering with third-party security providers.

Seven ways to modernize a cyber defense program

by

A new industry guide highlights key capabilities that state agencies can implement to strengthen their cyber defense strategy.

How states are building smarter internet security out to the edge

by

Cloudflare’s John Kaden discusses automation and bot management tools that give state and local agencies a more modern approach to infrastructure security.

Four ingredients to a successful security strategy

by

It’s critical that public sector security systems and policies can protect against new cyberthreats. What types of attacks are on the rise and can IT leaders do about it?

Strategies to drive better outcomes from existing security programs

by

Security advisor Wendy Nather discusses a recent study correlating key security strategies to statistically greater program outcomes — and what that means to state leaders.

Using modern authentication controls to mitigate fraud risks

by

Fraud can quickly drain state and local agency resources. However, with modern authentication controls, CIOs and CISOs can mitigate fraud and security risks.

Using modern identity tools to limit fraud, waste and abuse

by

Digital services for citizens are increasingly important. By using cloud-based identity tools, agencies can mitigate abuse of funds and help those most in need.

TwitterFacebookLinkedInRedditGmail