In this ebook, experts from industry and public sector offer a glimpse at the latest technology developments, share best practice tips and reveal the early value that AI is delivering to agencies across government.
Read More »Wayne LeRiche, the federal civilian field chief technology officer and solutions architect for Palo Alto Networks Federal, discusses how secure access service edge sets a framework for agencies to more easily implement a zero trust architecture.
Listen Now »From data centers through clouds and out to the edge, 5G networks are facilitating innovation at an unprecedented pace. So the question is: How can we align government and industry objectives and leverage all the resources in play to achieve the goal of open, interoperable and secure 5G networks?
Read More »Habib Hourani, Solutions Engineer at Okta, discusses how zero trust and adaptive security workflows support more robust cloud environments.
In this GovTech report, Carahsoft's industry partners discuss how the pandemic has created an inflection point for state and local government cybersecurity strategies and detail how agencies can adapt to massive changes in the risk landscape.
Ted Wagner, Vice President and CISO at SAP NS2, explains why agencies need a blend of people, processes and technology that meets their specific mission needs.
At the start of the pandemic, security personnel and resources were stretched exceedingly thin. Now is the time to reassess security policies and strategies.
Ashok Sankar, Director of Industry Marketing, Public Sector and Education at Splunk, explains why managing a secure cloud requires continuous monitoring of all relevant data for meaningful insights.
State and local government leaders pushed themselves to the limit to keep government operations afloat in the initial phase of the pandemic. Sumit Sehgal, Chief Technology Strategist, U.S., for McAfee, shares insights to help organizations prepare for the…
Ignacio Martinez, Vice President of Security, Risk and Compliance at Smartsheet, details how cloud-based tools are transforming teamwork and employee productivity regardless of location.
As organizations undergo digital transformation and move to more dependency on internet-connected devices, disruption occurs. With that disruption comes risk. Steve Schmalz, Field CTO, RSA’s Federal Group, discusses digital risk management and key…
Stephen Kovac, Vice President of Global Government at Zscaler, describes how TIC 3.0 is allowing agencies to extend security to users beyond the network’s perimeter.
Dean Hullings, Global Defense Solutions Strategist at Forescout, examines how identity and access management and training affect mission delivery.
Carahsoft's FedRAMP security and compliance provider partners share their insights on navigating and expediting the process to achieving FedRAMP authority to operate (ATO).
Raymond Pompon, Director at F5 Networks, discusses the complexities of protecting componentized applications and digital services and suggests ways to stay ahead of today’s application threats.
John Hale, the Chief of Cloud Services at the Defense Information Systems Agency, shares his experiences on DoD's shift from defense-in-depth to zero trust strategies to better authenticate mobile devices and support the warfighter.
Morey J. Haber, CTO and CISO of BeyondTrust, explains why privileged access management and cloud-based security are essential for protecting a remote workforce.
GovTech's public sector research team breaks down the numbers behind the growing trend toward open source adoption and details the reasons enterprise open source is particularly attractive to state and local governments.