By shifting from a device-centric to a user-centric model of communications, government organizations can better meet user needs and increase overall productivity.
ALL GOVERNMENT BUSINESS COUNCIL POSTS
As cyber threats become more prevalent and sophisticated, agencies face immense pressure to improve cyber defenses. But what is the current state of federal cybersecurity, and what cyber defense elements need the most improvement?
Despite continued, widespread concern for federal cybersecurity, the current state of agency cyber defenses has been difficult to ascertain. New primary research provides greater insight and underscores the importance of personnel management and awareness.
To fully realize the benefits of mobile technology, federal agencies require mobile security solutions that are both flexible and scalable enough to meet the diverse needs of the federal workforce and tough enough to safeguard government communications against a wide array of modern threats.
To realize the benefits of mobile technology, federal agencies will need to strike a balance, employing new technologies and innovative deployment models to give their workforce the flexibility they need with security they can trust.
Technological, cultural, and budgetary hurdles are straining the goal of a digital and mobile federal workforce. What is your agency doing to meet the challenge?
The Obama Administration has called for agencies to develop more holistic cybersecurity, but where do managers begin?
Recent high-profile security breaches should remind federal agencies that mobile security remains the weak link in the cyber chain. Addressing these threats means investments in new technologies as well as personnel training.
With nearly half of all federal government employees now eligible to telework, what can managers do to be most effective in leading their teams -- regardless of location?
Federal agencies are slowly making the switch to the new Internet Protocol, IPv6, which promises a near limitless supply of IP addresses and greater security. But beneath the surface, the transition process raises significant security concerns.