IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Sponsored

This page consists of content produced by a sponsor or produced by the e.Republic Content Studio in collaboration with a sponsor.
More Stories
  • Sponsored
    The Colonial Pipeline ransomware attack was a jarring reminder that null and services to the public could easily be the next target.
  • Sponsored
    The idea behind Kyosei is that all people, regardless of race, religion or culture, should be harmoniously working and living together for the common good. Canon Solutions America is committed to that ideal and actively seeks out similar organizations.
  • Sponsored
    Hacks continued to make headlines and disrupt multiple aspects of daily life in 2021, from gas consumption to meat production and more.
  • Sponsored
    Four key points for digital transformation and IT modernization projects.
  • Sponsored
    Preparations for the fall must include strategies to defend against the rising tide of ransomware and other security threats.
  • Sponsored
    Future-focused thought leader talks about how schools will win the education revolution.
  • Sponsored
    Find out more about how Red Hat® OpenShift® incorporates evolved security and compliance with Kubernetes.
  • Sponsored
    Government agencies cite improved productivity and limited cost associated with deploying PayIt as key contributors to ROI of implementing new digital government platform.
  • Sponsored
    Change is especially challenging for governments and locales. In the face of chaos, successful counties pivoted to a digital-first approach. See a shining example of how one county achieved it.
  • Sponsored
    Why Peer Partnerships Matter
  • Sponsored
    Governments are more digitally connected than ever before, making them more effective and constituent-friendly – but also increasing their vulnerability to cyber attacks. Because a growing number of high-profile cybersecurity breaches involve trusted insiders or compromised network credentials, organizations are moving toward a zero-trust security approach to safeguard valuable data and systems.
  • Sponsored
    While cloud environments have plenty of moving parts — and hybrid ones even more so — government technology leaders must focus on an element with even greater numbers: their workforce.
  • Sponsored
    What cyber security threats should enterprises look out for in 2022?
  • Sponsored
    While cloud offers governments the opportunity to leverage the capabilities of outside providers to deliver scalable and responsive services, technology leaders still have the responsibility to ensure their users can reliably access those services.
  • As the former chief risk officer for the state of North Carolina, Maria Thompson is an expert on working to manage and mitigate cyber threats. She has become a prominent national voice on the issue of cyber resilience in the public sector. Now, as the cybersecurity leader for state and local government at Amazon Web Services (AWS), Thompson is focused on helping government organizations protect their hybrid cloud environments from phishing, ransomware, and other increasingly sophisticated attacks.
  • Sponsored
    Oklahoma City has a top-notch IT team and well-defined processes, but the city government was held back by an antiquated null (ITSM) platform; learn how they addressed this challenge.
  • Sponsored
    The best places to start, the potential trouble spots, and the number one thing to ensure a successful governmentwide transition to zero trust.
  • Sponsored
    If you’ve ever lost your phone only to find it shortly after, you probably used an app tracker to help you find it.


Most Read
  1. Bob Osmond Nominated to Lead Delaware State Technology
  2. After Pilot, NYS Expands Staff AI Training to Over 100,000
  3. Ahead of ADA Compliance Deadline, Procurement Is Changing
  4. Autonomous Truck Pilot Focuses on Laredo, Texas, Freight Route
  5. North Haven to Automate $250 Fines for Passing School Buses