Leveraging Mobile Containerization in Government
Mobile containerization enables employees to access mobile content securely, regardless of their network location and without expensive endpoints.
Get the latest insights from Samsung delivered right to your inbox.
Follow Us
Get the latest insights from Samsung delivered right to your inbox.
Mike Chapple is an information security expert with over twenty years of experience in the field. He currently serves as Senior Director for IT Service Delivery at the University of Notre Dame where he teaches undergraduate and graduate courses focusing on cybersecurity issues. Mike’s experience spans the public and private sectors and includes expertise in cybersecurity, cloud computing, data governance, project management and IT compliance matters. Mike is the author of over 25 books including the best-selling CISSP Study Guide. Follow Mike on Twitter @mchapple.
Mobile containerization enables employees to access mobile content securely, regardless of their network location and without expensive endpoints.
The Retail to Regulator framework is helping agencies leverage technology to improve government services.
Successful government transformation requires creating a culture of innovation, but leadership could face resistance from legacy staff.
Digital transformation efforts promise to improve the efficiency of government transactions by reducing costs and driving constituent satisfaction.
Government agencies can leverage customer experience tools such as nudging, journey mapping or market segmentation to improve constituent relationships.
NASCIO's 2016 survey of state CIOs revealed several consistent IT trends, including cybersecurity, legacy system modernization and workforce evolution.
As the Internet of Things becomes more prevalent, this disruptive technology has the potential to threaten the cybersecurity of public and private sectors.
More than half of users click on malicious links in emails. Here's why defending against a spear-phishing attack requires mobile-focused security controls.