This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Neglecting regular patch management can create gaping security holes, leaving agencies susceptible to malware, ransomware and other attacks. In fact, according to Sophos, almost a quarter of state and local government IT leaders report exploitation of unpatched vulnerabilities as the root cause of ransomware.
The Commonwealth of Massachusetts has experienced a great deal of success in adopting a single identity and access management solution for its employees since committing to Microsoft Azure Active Directory in 2018, the state’s chief operations officer said Monday during the annual conference of the National Association of State Chief Information Officers. (..)
Adopt Cloud-Specific Security Tooling Solutions such as cloud security posture management and cloud workload protection secure cloud-native applications and environments from development through production. Centralized tools go a long way toward streamlining security and…
The National Association of State Chief Information Officers recently released its State CIO Top 10 Policy and Technology Priorities for 2023, and cybersecurity and risk management are a top focus this year. With the increase in threats from state and rogue actors, this really comes as no surprise.
The National Association of State Chief Information Officers recently polled its members as to their top priorities this year, and data management placed high on their list. But state and local governments aren’t the only national enterprise…
In Massachusetts, a new comprehensive workspace management program has streamlined the deployment of computing devices to state employees, removing IT staff from the process entirely. It has been key in supporting the commonwealth’s move to remote and hybrid work.
It was a link to a print news magazine called Words from Marion County Public Library System in Ocala, Florida. It’s been a while since I’ve seen a print news magazine from a library. She and several other employees manage all the marketing and public relations for the library. Who will manage the production?
Proper facilities management is essential for any organization to keep employees safe and working environments functional. Given its importance, state and local governments would benefit from modernizing their facilities management practices to optimize efficiency.
In the past, the city of San Diego relied on a range of vendors to support ticketing, service-level agreements and asset management for a variety of solutions. Today, the city has consolidated all of that into ServiceNow, a cloud computing platform that helps to manage digital workflows. “The
Data governance fills that role: It helps organizations define and manage the ways in which data is input, stored, accessed and ultimately deleted. State government needs policies and procedures to ensure data is accurate and handled properly from the start. So, what Is Data Governance?
Identity and access management bundles two critical components of every organization’s security architecture: authentication, in which a user or computer proves its identity; and authorization, which maps users and groups to organizational assets, defining what level of access is allowed for every identified entity.
The Syracuse Department of Public Works manages a fleet of 150 snow removal vehicles to clear city streets. In Syracuse, N.Y., snow typically falls from November to April, dumping significant precipitation on the city for more than five months of the year.
With 180 million documents a year to process and a billion secured in its data repository, the California Department of Motor Vehicles faced document management challenges long before the complications of REAL ID or the pandemic.
Code for America advocates easing the citizen experience in clearing criminal records when appropriate. “A A criminal record can be a life sentence to poverty, creating barriers to jobs, housing, education and more,” the nonprofit notes on its website.
Until recently, analysts estimate, many large police departments were among the leading buyers of physical media, especially CDs and Blu-ray discs — not that they wanted to be.
The reality is that government networks may have a lot of connected equipment that IT staff dont manage or care about, which can create headaches for security teams. Ideally, in such situations, the security team will tell IT that if an asset is on the network, it needs to be in a configuration management database.
The South Florida Water Management District oversees water resources for more than 9 million residents, from Orlando to the Florida Keys. That means monitoring water quality, especially in Lake Okeechobee, the largest freshwater lake in the state and the 10th largest lake in the country. That’s no small task. “My My staff is about 75 Ph.D.
The city of Coral Gables, Fla., wants to be paperless by the end of next year. Speaking on a panel Wednesday at the Fall 2022 Smart Cities Connect conference, Coral Gables IT Systems Analyst Rayza Collazo said her department talked with other city agencies about why they print paper. “We We asked them, ‘Why are you printing?’
Enter identity and access management. As state and local government agencies modernize IT infrastructure to support hybrid work environments and cutting-edge citizen services, they also find themselves having to secure access to a mix of modern and legacy systems.
Innovation Program Manager Marlin McDaniel heads a team focusing on technology projects that could improve the lives of county citizens and digitalize processes for county employees. StateTech Managing Editor Mickey McCarter interviewed McDaniel about ongoing initiatives and measurable success in his county’s innovation efforts.
Cities and counties have started deploying servers and data centers at the network’s edge in support of everything from water infrastructure to real-time traffic controls, power grid management and more. By moving compute instances close to data sources, they’re able to deliver real-time analytics and other key capabilities.
EA is linked closely to IT investment management and enterprise portfolio management; the three concepts complement and support… One of the most important building blocks of a healthy state IT program is having a strong enterprise architecture.
Following the federal lead from Capitol Hill, the states of Arizona, California, Oregon, Texas and Washington were among early states establishing formal telework, beginning as early as 2001.
According to the International City/County Management Association, many municipalities are only beginning to explore artificial intelligences potential in complex budgeting and finance domains.
Forty-eight percent of states say at least half of their applications need to be modernized, yet only 36 percent have detailed, current information about their application portfolio to make that happen, according to a recent survey conducted by the National Association of State Chief Information Officers and cloud service provider VMware.
As deputy city manager and chief public safety officer in Maricopa, Ariz., While these powerful models help bring generative AI to life, they need to be handled with care to ensure privacy and security, among other considerations.
What Al Rawi found, however, was a variety of legacy systems — including what he describes as COBOL programming-based green screens dating back to the 1960s — being used to manage case-related information. So, the public defender’s office began to investigate available options for a case management system.
Security preparedness is the cornerstone of digital government, and identity and access management is the cornerstone of security preparedness. The core challenge at the state and local level is to optimize the digital experience for citizens and government employees while ultimately improving security.
Enterprise portfolio management is critical for any large organization, including state and local governments. EPM is a practice in which organizations create structured processes to monitor and manage all portfolios across their enterprises.
Cybercrime is growing at a disturbing rate, with incidents of malware, ransomware and data breach attacks continuing to rise. Criminals took advantage of digital transformation and the move to remote work during the pandemic to launch attacks on all types of organizations, including state and local governments.
The militarys ongoing transition to skills-based hiring demands considerable changes to branch hiring manager practices. Skills-based hiring isnt a new concept; industry already does it.
Reliance on and trust in managed service providers is growing among state governments, particularly for cybersecurity. Others chose to outsource only specific functions, such as security information and event management, risk assessments, incident response, and more. This increased…
From desktops to smartphones, device management is a difficult exercise for government IT teams. A critical piece is application management: making sure that everyone has the right apps to do their jobs, updated to the correct version, with all the supporting tools.
“I’m the crazy person on the sidewalk with the sandwich board that says the end of the world is coming,” says Maija Reed, plans section chief for the Idaho Office of Emergency Management.…
Today’s state and local agencies are savvy about the power of the internet, particularly as they emerge from the pandemic, and they are interested in providing citizens with the means to accomplish tasks through government websites.
SAMA provides an analysis of an organization’s application portfolio to help accelerate digital transformation, strengthen application security and improve application performance and management. CDW’s SAMA is an automated solution that analyzes application codebases for modernization.
Filling in these requirements plants the seeds for what we call modern workspace management. Once those personas are built, agencies can fill in the procurement chain, security precautions, automation tools and other requirements for the job. Adoption of modern…
It happened five weeks in a row, and the city manager told me we needed some way of detecting bubbles in the fountain, says Stephen Dawe, CIO for the city of nearly 40,000 people. But when it happened 17 times in one year ruining several $30,000 pumps and requiring a two-day cleanup process each time city officials in Opelika, Ala.,
EA is linked closely to IT investment management and enterprise portfolio management; the three concepts complement and support… One of the most important building blocks of a healthy state IT program is having a strong enterprise architecture.
A pivot to cashless tolling last summer on the 236-mile Kansas Turnpike is already paying dividends for drivers and roadway managers alike. For drivers, the new system means no longer having to slow down or stop to pay their tolls. Traffic is moving more smoothly now, and thats made the turnpike safer for travel.
According to Gartner, government agencies should integrate security tools under centralized management to gain maximum collaboration between their platforms. To analyze and augment the cybersecurity posture of the modern distributed organization, Gartner coined a phrase: cybersecurity mesh architecture.
We organize all of the trending information in your field so you don't have to. Join 40,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content