special report

How agencies can mitigate cyber risks from unmanaged devices

by • 5 months ago

Though agencies loosened “bring-your-own-device” policies last year, they can still stay ahead of cyberthreats by integrating dynamic access policies.

How healthcare agencies can tackle fraud, waste and abuse with RPA

by • 7 months ago

A new report discusses advances in automation to help public healthcare organizations tackle a backlog of claims from the pandemic, and protect from fraud and waste.

How modern e-signature tools facilitate paperless processes

by • 7 months ago

Remote work requires new ways to manage paperwork, prompting organizations to turn to secure, cloud-based tools to sign and process documents.

From the CISO’s desk: building a stronger cybersecurity posture

by • 1 year ago

The New Jersey Courts were prepared to pivot quickly when the coronavirus hit, thanks to efforts to build a comprehensive cybersecurity framework.

Smart infrastructure spending to bridge legacy and cloud IT

by • 1 year ago

Virtualized infrastructure that integrates legacy and modern applications in a multi-cloud environment can help agencies lower operating costs and strengthen security.

For a more secure Next-Gen 911, look at network demands

by • 1 year ago

A new report looks at reasons why public officials should evaluate their future network demands before rolling out Next-Gen 911 upgrades.

State agencies urged to move beyond login credentials to counter cyber risks

by • 2 years ago

Agencies that still rely on user IDs and passwords alone are most at risk to cyberthreats and should move to stronger identity and authentication technology, says new report.

Ransomware defense starts with smarter backup and recovery plans

by • 2 years ago

State IT leaders can reduce the cost and disruption of ransomware threats by proactively safeguarding data before it’s attacked, report says.

IAM solutions that help deter ransomware and cyberthreats at agencies

by • 2 years ago

State and local agency CIOs can take advantage of modern identity and access management tools to mitigate cyberthreats against critical data, report says.

TwitterFacebookLinkedInRedditGmail