Ideas
4 Myths of Citizen Experience
What is required for success is to abandon old myths and fundamentally shift our thinking.
Ideas
The Future-Forward Cybersecurity Fix
The U.S. government is playing catch-up on security primarily because it has not been able to keep up with the advances in technology over the last decade.
Ideas
4 Steps to Boost Records Management Practices
Federal employees and managers aren't confident about what actually constitutes a record.
Ideas
Government Hacked Yet Again. It's About Time Federal Cybersecurity Became a National Issue
The aftermath of the OPM hack, with all its humiliating details of ignored warnings, has shown the federal government is both stubbornly slow to fix mistakes and woefully understaffed with cybersecurity experts.
Ideas
How to Secure an Increasingly Mobile Federal Workforce
Adopting strong authentication by using derived PIV credentials may be an agency’s best and first line of defense.
Ideas
5 Questions to Ask Before Redesigning Your Agency Website
Before embarking on this potentially time-consuming and costly endeavor, agency decision-makers need to ensure their teams have the right information.
Ideas
Post-Megabreaches, Feds Should Focus on Third Party Risk
Continuous monitoring of third parties and reducing reliance on paper-based risk assessment will help address some of the root causes for the recent hacks on the government.
Ideas
In the Future, We’ll All Use Our Phones to Identify Ourselves
The most successful mobile identity services highly depend on collaboration between public authorities, banks, telecom operators and the private sector.
Ideas
After the OPM Breach, It’s Time for IT Organizations to be Accountable
Modernized technology and formal standards like FISMA won’t be enough -- mindsets must change, too.
Ideas
Why Chief Data Officers Should Really be Chief Digital Officers
Having a chief data officer is akin to the Army having a chief bullet officer or hospitals having a chief bandage officer.
Ideas
Post-OPM Hack, An Opportunity to Retool Encryption
Redefining encryption in a more holistic manner can be done with the proper technologies and policies in place – even for something as old as a COBOL legacy.
Ideas
OPM Data Breach: What Needs to Happen Now
Given that OPM handles records for federal employees, including those obtaining security clearances, the damage can potentially go beyond financial crimes.
Ideas
4 Top Challenges for Federal CIOs
Cybersecurity, data management and culture remain roadblocks for agency CIOs.
Ideas
6 Reasons Your Agency Needs an App Store
Does your agency have an enterprise app store? If not, then consider these six benefits to adoption.
Ideas
Governments Around the World Join Data-as-a-Utility Revolution
The new public sector push to digitize says digital infrastructure is now just as important as the physical infrastructure of government.
Ideas
OPM Hack: Why Email Notification Makes a Bad Situation Even Worse
By using a third party to manage data breach communication, OPM has now, in essence, provided phishers with a blueprint for creating an attack.
Ideas
Here's What You Can Do to Secure Your Network as the Internet of Everything Nears
A “network as a sensor” approach can help IT security teams leverage mobile, cloud and IoE endpoints to increase transparency.
Ideas
5 Things You Need To Know About the USA Freedom Act
Its predecessor, the Patriot Act, garnered outrage and changed security policy globally. What should we expect from the Freedom Act, hastily passed last week?
Ideas
How to Secure WordPress in 10 Steps
The mitigations needed to secure a WordPress system and fortify it from attacks are many.
Ideas