Sponsored
This page consists of content produced by a sponsor or produced by the e.Republic Content Studio in collaboration with a sponsor.-
SponsoredHow state and local government CIOs are expanding service management beyond the help desk to transform HR, facilities and finance.
-
SponsoredAs emerging technologies reshape government operations, agencies are turning to cross-skilling to build a more adaptable workforce and close critical talent gaps.
-
SponsoredThe DOJ’s new ADA Title II rule requires accessible government websites and apps. These nine steps help public agencies understand deadlines, prioritize fixes and build a sustainable accessibility plan.
More Stories
-
SponsoredFind out what has driven the scale of these hacks to increase and what governments can do to protect themselves from bad actors infiltrating their networks.
-
SponsoredAn agency can run a completely compliant network and still be breached by a trusted user’s account being exposed.
-
SponsoredHiPER Solutions is pleased to bring you the Best of Government from the HiPERleadership podcast, where leaders share stories of game-changing success, struggles, and lessons learned along the way.
-
SponsoredHear from Steve Winterfeld, advisory CISO at Akamai, on steps you can take to ensure your vaccine site performs under load.
-
SponsoredHear from Ari Weil, VP of product marketing at Akamai, on how to ensure performance and security for your vaccine website.
-
SponsoredThese unmanaged and IoT devices have little or no security, exposing risk to any organization and their customers especially when confidential data is obtained.
-
SponsoredSecurity teams today are still overwhelmed by a never-ending barrage of cyberattacks, immense workloads, and fast burnout rates.
-
SponsoredIt doesn’t matter whether we are discussing a ransomware attack, an advanced nation-state or politically motivated hacktivists — it’s not a malware problem, it’s an adversary problem.
-
SponsoredThe VIVE Pro Secure is a first-of-its-kind system offering a fully TAA-compliant VR solution cleared for use in government classified or secure business environments where sensitive IP mandates authority to operate (ATO) certification.
-
SponsoredGovernments worldwide are taking the bold, but necessary step to reimagine the way they govern, serve, and protect their countries and communities.
-
SponsoredWhen we think of buildings, we often imagine the physical structures we enter in order to access our offices, schools, campuses, and manufacturing floors.
-
SponsoredDefense-in-depth applies layers of controls and mitigations to systems and networks, providing redundancy and reducing the likelihood of a successful cyberattack or a single point of failure.
-
SponsoredAn integrated strategy to ensure connectivity for government workers, businesses and citizens is helping make a more convenient city for all.
-
SponsoredLearn about the efforts to improve U.S. government cybersecurity, why those measures haven’t worked very well so far and how to make your government organization more resilient to cyber attacks.
-
SponsoredFrom planning inventory to scheduling vaccines to gaining public trust, data analytics and visualization technologies offer powerful weapons in the fight against COVID-19.
-
SponsoredGovernment is not always user-friendly, but that is changing. Learn about citizen-centric government design and how local government is becoming more focused on serving community needs by design.
-
SponsoredState and local agencies experienced one of the most historic — and chaotic — years in 2020.
-
SponsoredState quickly migrates core IT systems to manage sudden spikes in demand related to COVID-19.
Most Read