Hillary Clinton has a slight lead over Donald Trump among federal employees, according to an independent Government Business Council / Government Executive poll released on July 18, 2016.
ALL INSIGHTS Report POSTS
As government organizations work to devise robust defensive strategies, it is critical that they take into account the role of the workforce in making or breaking cybersecurity measures.
In order to keep pace with citizen demands, state and local governments must maintain a powerful online presence capable of delivering relevant, personalized information and services.
Government contractors are actively seeking ways to maintain their competitive edge in a volatile federal marketplace, and the result has been a surge in mergers and acquisitions across the government services sector. GBC's exclusive flash poll series takes a closer look at federal perspectives on industry consolidation.
Federal leaders are striving to balance operational effectiveness and security by transitioning to an “Identity Ecosystem” – an online environment designed to enhance government-wide identity and access management (IAM). In an effort to learn more about the current state of federal IAM, GBC undertook an in-depth research study as a follow-up to a previous December 2013 survey.
In today’s complex, unpredictable threat environment, resilient incident detection and response initiatives are paramount.
When it comes to state and local cyber breaches, the biggest threats may come from the inside.
The past few years have seen an explosion of cyber attacks, and agencies are racing to implement proactive, holistic cybersecurity measures. In order to measure changing federal perceptions and experiences regarding the present threat landscape, GBC conducted an in-depth research survey as a follow-up to a previous June 2014 study.
Over the last five years, the Department of Defense has aimed to create a unified, secure and reliable communications environment built on shared IT infrastructure, known as the Joint Information Environment (JIE). Innovative procurement models like JELA make it happen.
Last year's OPM breaches highlighted the sheer vulnerability of organization and personal data against the ever-growing threat of cyber attacks. GBC's exclusive flash poll series takes a closer look at government perspectives on organization cybersecurity.