• Mobilizing Your Enterprise Securely

    Mobile applications introduce new security vulnerabilities. Brian Reed, chief mobility officer for NowSecure, describes the risk landscape and shares key steps to a mobile application security program.


    • Mobility, NowSecure
  • Addressing Today’s Mobile Threats

    Today, mobile devices are prime targets for cybercriminals because they contain more and more sensitive employee, constituent and operational data. Jim Kovach, vice president for public sector at Zimperium, explains why signature-based threat detection is obsolete and device attestation is in.


    • Mobility, Zimperium
  • Moving from Mobile-First to Mobile-Only

    In this Q&A, the BlackBerry Sales Engineering team lays out key considerations for state and local governments as their mobility programs expand and morph to take advantage of emerging technologies and accommodate new use cases.


    • Mobility, BlackBerry
  • The New Mobility Equation

    Omar Sandoval, director of government programs for the Center for Digital Government, shares insights on how mobility implementations are changing and how agencies can take advantage of the opportunities these shifts present.


    • Mobility, All
  • The Best of What’s New in Cybersecurity

    Bigger threats drive new approaches.


    • Cybersecurity , All
  • Centralizing Cyber

    States and localities increase coordination with the federal government.


    • Cybersecurity , All
  • Navigating Security in a Fast-Changing Environment

    Hybrid work, multi-cloud deployments and increasingly vulnerable software supply chains are just a few of the cybersecurity challenges that organizations face today. Brandon Shopp, group vice president of product for SolarWinds, discusses cybersecurity trends, threats and solutions organizations should keep top of mind as they move into the future.


    • Cybersecurity , SolarWinds
  • User Identities in a Zero-Trust World

    A key pillar of Zero Trust is identity, which uses capabilities such as multifactor authentication (MFA) to continuously verify the identity of a person or device. Hanna Wong, director of public sector marketing for Keeper Security, discusses how organizations can modernize their identity security approach to move toward a Zero-Trust model.


    • Cybersecurity , Keeper
  • Secure Collaboration for the Work-from-Anywhere Future

    The massive shift to remote work highlighted the need to modernize the way state and local governments protect content used in collaboration and workflows. Murtaza Masood, managing director for state and local government at Box, discusses how government leaders can secure content while making it seamlessly available to workers and constituents.


    • Cybersecurity , Box
  • What High-Performing Security Organizations Do Differently

    Organizations that implement a range of best practices are better at closing IT security gaps and making the most of their cybersecurity investments. HPE executives Joe Vidal, master technologist in the company’s Office of North America CTO, and Allen Whipple, server security and management solutions business manager, discuss key strategies for improving and simplifying IT security.


    • Cybersecurity , HPE
  • Growing Threats and Changing Relationships

    Mark Weatherford explores emerging security threats and the changing cybersecurity relationship between states and localities and the federal government.


    • Cybersecurity , All
  • Why Zero Trust Matters at Work (and How to Foster It)

    Cybersecurity affects us all, so we wanted to make this resource inclusive. We are taking the best of what human-centered design and intentional language can teach us about effectively communicating major security shifts that are impacting and will continue to impact how you work, where you work and your ability to serve a diverse public using technology effectively and securely.


    • Cybersecurity , All
  • FNN Expert Edition 2022 ITES-SW2 Contract Guide

    With the Army’s Information Technology Enterprise Solutions – Software 2 contract potentially lasting for a decade, the Program Executive Office Enterprise Information Systems knew it had to build in some gates to refresh and relook at the multiple-award ITES-SW2.


    • All, All
  • Practical Ways to Make Zero Trust a Reality and Add Value

    An interview with Michael Epley, Chief Architect and Security Strategist, Red Hat


    • Cybersecurity , Red Hat
  • FCW Report: Accelerating Digital Transformation

    By teaming up with industry, agencies can speed their ability to adopt the latest technologies and start reaping the benefits of modern, flexible IT ecosystems.


    • Emerging Technologies, All