5 Ways to Reduce Election Security Risks

Election officials must ensure the security of our election process, a daunting task due to tight budgets.

Where Are All the Threat Hunters?

Fewer than a fifth of organizations have a dedicated threat hunting team.

Vigilance Is Required to Protect Midterm Election Voting

The question of whether your vote is safe may come down to where you live.

Twitter Should Kill the Retweet

The feature derails healthy conversation and preys on users’ worst instincts.

We Need More Pentagon and Tech Industry Collaboration, Not Less

Now more than ever our country needs the government and private sector to partner to win the artificial intelligence race.

Modernizing Government IT Starts with Data

When thinking about IT modernization, organizations too often think at an application level.

Insider Threats Are Alive and Well. Take These 6 Steps to Reduce Risk.

The recent sentencing of a National Security Agency analyst shows agencies need to remain vigilant.

Report Offers Options For Effectively Using Blockchain in Government

Blockchain is often seen as an over-hyped technology. But that doesn’t mean it doesn’t have its uses.

Emerging Technologies Will Disrupt Government. Here’s What to Do About It.

Forward-thinking government leaders can follow these steps to stay ahead of the curve.

Boring Details Make Effective Legislation

In a perfect world, you’d see the addition of mandates come with some much-needed subtraction as well.

Could Do-It-Yourself AI Make People More Comfortable with It?

As artificial intelligence makes strides in government, it could be helpful to see for yourself what the tech can do.

Are GSA’s Bold Data Management and Transparency Moves the Right Moves?

The General Services Administration's hunt for an agency-specific entity identifier conflicts with the Office of Management and Budget's push for a governmentwide data strategy.

Attention Federal Agencies: DMARC is Not a Silver Bullet for Email Security

DMARC is just one small piece to the very complicated email security puzzle.

Want Safer Internet of Things? Change Government Buying Rules.

Federal agencies could shape the security of connected devices by using the Federal Acquisition Regulation.

The Security Advantages of Cloud Computing Revisited

Seven years ago, we understated the case for cloud security.