Aligning to Public Sector Talent Needs Through Agile Workforce Planning

Soft skills are becoming a larger predictor of hiring success than finding candidates with the right technical knowledge (that may become dated within the short to medium...

Fake Realities, Blockchain, and Star Trek

With the rise of cryptocurrencies, blockchain technology is garnering a lot of interest. But there is loads of potential in blockchain technology for government starting...

Hacking Voting Machines: Democracy and Elections Are at Risk

Voting machines are just like any other machine – susceptible to cyberattacks and vulnerabilities. But how easily can this be done? And how can governments start...

Build Your Security Culture by Reminding Your Employees That They Are Citizens Too

Governments are in a unique position where their employees are also their citizens – leverage this in order to build a stronger security culture.

Microsoft’s Ignite Announcements Take Direct Aim at the Competition

Microsoft’s Ignite conference speaks to enterprise developers and IT teams, and this year’s event is making waves with a slew of new product announcements aimed squarely...

Microsoft’s Ignite Announcements Take Direct Aim at the Competition

Microsoft’s Ignite conference speaks to enterprise developers and IT teams, and this year’s event is making waves with a slew of new product announcements aimed squarely...

Virginia Endorses the NICE Cybersecurity Workforce Framework

Virginia has become the first state to officially endorse the NICE Cybersecurity Workforce Framework as a means to counter its cybersecurity skills shortage. Focusing on...

How to Protect Your IT Budget in State Government

For several years now, most state governments have been struggling to balance their books in times of increasing constituent demand and diminishing tax revenue and...

Government: Considerations for a Security Strategy

Governments are focused on improving areas of security across people, process, and technology. Here is what we’ve learned across 15 security governance workshops with...

Can I Trust You? Becoming a Trustworthy Public Sector IT Leader

Trust is contingent on your ability to demonstrate credibility, reliability, and stakeholder engagement. Public sector IT leaders need to obtain trust from corporate...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us