Blacklisting the White Box: Why Open Networking Solutions Aren’t Catching On in Spite of the Financial Incentives

Despite the possibility of saving public money and providing additional capabilities, government IT refuses to exercise its consumer choice with networking vendors. We’ll...

Drive Your Constituent Interaction Strategy With Personas and Journey Maps

When creating a technology strategy for constituent interaction, many organizations jump headfirst into procuring applications without fully understanding the varying...

The Infrastructure Implications of Mass Casualty Events

Mass casualty events produce a substantial amount of digital evidence. This evidence can overwhelm even the most well-prepared municipal and law enforcement IT...

Does the GDPR Apply to Foreign Government Agencies?

The European Union’s General Data Protection Regulation (GDPR) has a very wide scope, from definition of personal data, to what constitutes processing activities, to...

Cyber Physical Systems: The Low Hanging Fruit Between Cybersecurity and Artificial Intelligence

Understand the high potential of using artificial intelligence to defend critical infrastructure, smart grid technology, autonomous vehicles, and other cyber physical...

I Spy With My Little Eye: Cyberespionage on Critical Infrastructure

Cyberespionage on critical infrastructure has been a growing interest in the last decade. Using old tactics of spear-phishing, water-holing, and social engineering,...

&#@%-iNg_P4ssw0rds!: Password Fatigue and Government Employees

Passwords and online accounts are now a part of life, though most of us struggle to remember unique passwords for all of our accounts – a phenomenon known as “password...

Hacking Voting Machines: Democracy and Elections Are at Risk

Voting machines are just like any other machine – susceptible to cyberattacks and vulnerabilities. But how easily can this be done? And how can governments start...

Governments Are Handling More Sensitive Data Than Ever – How Does One Go About Classifying It All?

Governments today, whether municipal, state, or federal, are handling a great deal of sensitive information, but do not know how to properly handle it. Should all...

Build Your Security Culture by Reminding Your Employees That They Are Citizens Too

Governments are in a unique position where their employees are also their citizens – leverage this in order to build a stronger security culture.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us