Government

Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse

All government programs are vulnerable to fraud, waste and abuse – now more than ever. Government fraud is at an all-time high and growing rapidly. Industry research shows that all together, fraud, waste and abuse represent about 10 percent of overall government program spending. But what if governments could minimize deficits by eliminating fraud, waste and abuse? It’s an …

Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse Read More »

Government IT in an Era of Austerity

To achieve efficiencies in today’s turbulent economic climate, government entities need to integrate legacy applications with modern systems and web services. Orchestration between multiple systems across various departments and municipalities is needed to deliver quality public services. At the same time, public sector agencies face aggressive timelines and budget constraints, changing constituent needs, and open …

Government IT in an Era of Austerity Read More »

WI-FI: SECURE ENOUGH FOR FEDERAL GOVERNMENT?

One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point …

WI-FI: SECURE ENOUGH FOR FEDERAL GOVERNMENT? Read More »

Empowering eGovernment with Mobile Identity

Just as the proliferation of mobile devices, the Internet of Things and other elements of increasing connectivity have impacted our everyday lives, these trends are rapidly changing the landscape for government agencies. More agencies than ever before leverage advanced eGovernment applications to deliver citizen services. Government workers are at the forefront of the mobile workforce …

Empowering eGovernment with Mobile Identity Read More »

13 Federal Proposal Blunders and How to Solve Them – Stop Killing Your Win Rate

There are a wide range of mistakes Federal proposal responders regularly make. The biggest of which is forgetting that proposals need to persuade the Government that you possess some competitive advantage that your competition does not. Once you have the right content, you need to make sure that it is communicated well to the evaluator. …

13 Federal Proposal Blunders and How to Solve Them – Stop Killing Your Win Rate Read More »

A Call to Action to Protect Citizens, The Private Sector, and Governments

Information and Communications technologies have revolutionized our way of life and have driven economic and industrial development to the point where we have become highly dependent on cyberspace. Our way of communicating, interacting, pursuing education and even how we purchase items has been transformed with the growing penetration of digitalization which has changed our habits …

A Call to Action to Protect Citizens, The Private Sector, and Governments Read More »

Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices

Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Multifactor authentication is one of the most effective ways that federal agencies can protect mobile data and devices. Check out this issue brief discussing how the security approach needs to differ for mobile, …

Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices Read More »

Managing the Complexities of Information Security in a Post NDB Environment

THE NOTIFIABLE DATA BREACHES (NDB) SCHEME came into effect on Feb 22nd 2018, making it obligatory for every organisation covered by the Australian Privacy Act to notify the Australian government of certain security breaches. The 2019 Canon Security Report is a guide to understanding which organisations are affected by this policy, the types of security breaches …

Managing the Complexities of Information Security in a Post NDB Environment Read More »

15 Ways to Weed the Regulatory Violations Out of Your Spend

Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations.  How do you know if you have these violations hiding …

15 Ways to Weed the Regulatory Violations Out of Your Spend Read More »

Gorilla Technology Optimizes the Efficiency of its IVAR Intelligent Video Analytics Recorder

Deep learning is enabling a new generation of real-time video analytics technology that can identify and track people, vehicles, and more objects frame by frame in real time, providing state-of-the-art security for a wide range of businesses and government agencies. But along with the advances come challenges. Systems can be complex, and environmental inconsistencies make …

Gorilla Technology Optimizes the Efficiency of its IVAR Intelligent Video Analytics Recorder Read More »