IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.


More Stories
As the general election campaign begins in earnest, we can expect disinformation attacks to target voters, especially in communities of color, while evolving tech makes them harder to identify.
Powerful technology has perhaps never presented a bigger set of regulatory challenges for the U.S. government than it is at this moment, with an election year looming and disinformation flowing.
Almost everything we do requires Internet connectivity, from applying to a job, fulfilling work obligations, booking doctor’s appointments, banking, watching TV and even staying connected with family.
From the SolarWinds hack to the more recent, serious disruptions of Microsoft and Change Healthcare, cyber attacks on industries that do business with universities create vulnerable points of entry for cyber criminals.
If Florida is to continue growing as a national leader, its schools will need to cultivate career-ready skills of the future in artificial intelligence, digital literacy, critical thinking skills and multilingualism.
In an era marked by technological advancements, the thin line between ensuring public safety and invading individual privacy has become increasingly blurred.
From new laws to the K-12 "SIX Essentials Series," the NIST framework and assessments from the Department of Homeland Security, schools have state backup and abundant resources at their disposal to combat cyber threats.
As the need for skilled tech workers skyrockets, former federal CIO Suzette Kent argues organizations including state and local governments should start recruiting from less traditional pipelines.
For all the ed-tech innovations and bespoke software tools at the disposal of students today, don't let them overlook the power and versatility of one of personal computing's foundational technologies: the spreadsheet.
Federal agencies must transition to zero-trust cybersecurity postures by September of this year. Establishing a similar deadline for state and local agencies would spur action to lock down systems.
Two of the most important jobs of CIOs in higher education are to have a vision and align it with the institution’s goals. Going on a listening tour is a good place to start, as it helps forge trust and relationships.
Congress must stop dithering on AI and set up a regulatory structure as soon as possible to govern its development and use, and stop leaving it to profit-driven modern tech companies.
Students are using apps such as Tor, Psiphon and Proton VPN, commonly marketed as “censorship circumvention tools,” to bypass school content filters. Schools need multilayered security strategies to meet the moment.
In our interconnected world, lack of broadband feeds the digital divide within the United States, and if you think that doesn’t affect you, well, you’re wrong.
When innovation needs a boost, advance market commitments are a tool that not only secures value for taxpayers but also fosters environmental sustainability and economic development.
When it comes to a government computer network, the ounce of protection derived from a pre-emptive systems checkup can prevent the mass of resources necessary to cure havoc caused by a successful security breach.
As new learning methods are developed, the boundary between what is artificial intelligence and what is simply traditional computing methods keeps shifting.
From having a vision to strategic alignment to collaboration, innovation and talent development, here are 10 guiding principles for IT leadership success from a veteran CIO of the City University of New York.
To develop organizational maturity in an IT agency, leaders must foster a culture of continuous improvement and create a safe space for staff to try new ideas.
A bill moving through Congress proposes that districts receiving funds through the E-Rate program should not allow social media access, but it may be more practical for districts to address the problem individually.