Tags special report

Eliminate paper-based invoicing to save valuable government resources

by • 1 week ago

Agency CFOs and CIOs alike can benefit from investing in automated invoicing and payment systems. A cloud-based service would pay for itself in less than a year.

How state agencies can streamline users' online experience using IAM

by • 6 months ago

A modern identity and access management platform plays a central role in the overhaul of the Texas.gov portal.

Why cyberthreat intelligence offers the best defense against agency cyberattacks

by • 9 months ago

A new briefing report advises government IT leaders on how to gain an upper hand against cyberthreats by leaning on timely, accurate and relevant information.

How agencies are reducing travel and expense errors with automated tools

by • 11 months ago

Modernized expense reporting tools are helping organizations cut down on errors by up to 60 percent, improving financial transparency and employee productivity.

How to reduce IT friction and better serve first responders

by • 12 months ago

Emergency management officials in California, Florida and Houston highlight steps their agencies are taking to improve connectivity and interoperability for faster response.

How to strengthen security seamlessly with cloud

by • 1 year ago

State and local government agencies are turning to cloud to streamline and strengthen their organizations' cybersecurity efforts.

How to improve collaboration between developers and security teams

by • 1 year ago

The explosive growth of software containers has been a boon for agile development; but they can create hidden risks for security pros.

With open source pivot, government is poised to innovate business practices

by • 1 year ago

By embracing the technology and approach, state and local government agencies can find the right path to innovation.

Find path to innovation with open source, cloud

by • 1 year ago

Government leaders need to turn to commercially-supported open source and cloud technologies to deal with legacy modernization and cybersecurity challenges.

TwitterFacebookLinkedInRedditGoogle Gmail