Building effective virtual government requires new ideas, innovative thinking and hard work. From cybersecurity to cloud computing to mobile devices, Dan discusses what’s hot and what works in the world of gov tech.
Serverless computing allows a true platform-as-a-service environment, letting developers focus on coding rather than back-end operations.
Data can help governments solve specific problems and prepare for major events.
Many people and organizations think cybersecurity insurance can improve the cyberdefense status quo for the public and private sectors. But is that really the case?
First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know.
Renewed emphasis is being placed on vulnerabilities associated with voting machines.
If you want to increase innovation, many experts suggest slowing down first.
Why breach prevention and response strategies are both essential.
Hiring cybersecurity staff is difficult, but federal, state and local governments are working with nonprofits to encourage the development of cybersecurity skills through individual and team competitions.
You can’t secure the entire cloud, but you can take steps to secure your data.
You want the masses behind your security efforts and helping the team identify the bad apples, but not stifling innovators who make a positive difference.
The speaker was Facebook VP Vaughan Smith. "We all know that innovation is key to success, but how do we innovate at Facebook? The first key to innovation is moving fast, very fast," he said.
How things like the NSA, 9/11 and Y2K have influenced where security is headed.
The Metcalf incident is a wake-up call for better critical infrastructure protection.
Bracing ourselves for the onslaught of Internet-connected devices.
Does your government need a 24/7 security operations center?
Ransomware is a scary evolution of online fraud — and you must prepare to deal with it.
Small security breaches occur in government more often than many people are aware of.
New devices mean new policies for governments to enact.
Internet privacy has long been a hot-button issue. Central questions are being asked about who owns what data, how that data can be used by various companies to target individuals in marketing and whether users can opt-in or opt-out of various data-sharing approaches. Just as in other areas of life in America in 2012, these questions are often end up being settled in the courts.
3 tips for getting the go-ahead on security projects.
Government agencies can maintain security but still avoid being no-fun zones.
The Washtenaw County, Mich., Cyber Citizenship Coalition is a grass-roots effort that ensures residents use technology safely and securely.
Comparing public- and private-sector IT services is essential for effective leadership.
Many challenges remain to establishing digital identities, but state and local governments must act quickly.
Learning about an organization from the inside out.
Michigan chief technology officer learns about an organization from the inside out.
Government IT professionals need an all-encompassing, prioritized perspective to successfully address complex system issues.
The more you specify unique security requirements, the harder it becomes to obtain the benefits of cloud computing.
Emergency management's scenario-based planning is for budgets too.
South Africa's preparation for the 2010 World Cup provides valuable lessons for IT leaders.
Michigan shares digital infrastructure with Oakland County for cheaper, faster connections.
Opportunities, challenges and recommendations for virtualizing IT in the public sector.
IT project management strategies for state and local governments.
Dan Lohrmann gives six tips on handling a new information technology job in government.
Contractors must make security a priority.
Michigan CISO Dan Lohrmann discusses security challenges.
Utility computing can consolidate IT departments, but raises security questions.
Good e-government starts with good identity management.
Build technology recovery into broader emergency response efforts.
The road to better information security, ironically, passes through better information sharing.