Tags special report

IAM solutions that help deter ransomware and cyberthreats at agencies

by • 2 months ago

State and local agency CIOs can take advantage of modern identity and access management tools to mitigate cyberthreats against critical data, report says.

What state agencies can learn from Utah’s IAM consolidation

by • 4 months ago

Utah shows how centralizing identity and access management saves millions, improves user experience and prepares agencies for more ambitious IT projects.

Eliminate paper-based invoicing to save valuable government resources

by • 6 months ago

Agency CFOs and CIOs alike can benefit from investing in automated invoicing and payment systems. A cloud-based service would pay for itself in less than a year.

How state agencies can streamline users' online experience using IAM

by • 12 months ago

A modern identity and access management platform plays a central role in the overhaul of the Texas.gov portal.

Why cyberthreat intelligence offers the best defense against agency cyberattacks

by • 1 year ago

A new briefing report advises government IT leaders on how to gain an upper hand against cyberthreats by leaning on timely, accurate and relevant information.

How agencies are reducing travel and expense errors with automated tools

by • 1 year ago

Modernized expense reporting tools are helping organizations cut down on errors by up to 60 percent, improving financial transparency and employee productivity.

How to reduce IT friction and better serve first responders

by • 1 year ago

Emergency management officials in California, Florida and Houston highlight steps their agencies are taking to improve connectivity and interoperability for faster response.

How to strengthen security seamlessly with cloud

by • 2 years ago

State and local government agencies are turning to cloud to streamline and strengthen their organizations' cybersecurity efforts.

How to improve collaboration between developers and security teams

by • 2 years ago

The explosive growth of software containers has been a boon for agile development; but they can create hidden risks for security pros.

TwitterFacebookLinkedInRedditGmail