Contributed
Let’s not sugarcoat it: executive support can make or break any program within your organization (security-related or otherwise). No support means no budget, no resources, no prioritization. In other words: no program. Security awareness training specifically can have its own set of hurdles. Cybersecurity programs have traditionally focused on software solutions designed to prevent, protect, detect, and respond to attacks. With security awareness training – a very human aspect of your cybersecurity program – the lack of executive support will likely be the deciding factor as to whether it is implemented or not. It’s not just essential to ensure that you’ve got the backing to get the budget you need to create an effective and engaging training program. If the actions, habits, and cyber hygiene of the executive team don’t align with the message of your security awareness training program, the entire program can be undermined. For your security awareness program to be a success, the executive team must be convinced that the security mindset and culture created by security awareness training is the right thing for the organization and “talk the talk” and “walk the walk” when it comes to supporting this initiative.
        
    
        
    SHI is pleased to participate in the Los Angeles Digital Government Summit on August 13, the California Government Innovation Summit on August 20 and the Bay Area Digital Government Summit on August 28.
        
    
        
    A 2024 Guidehouse and CDO Magazine Report Reveals Key GenAI Adoption Opportunities and Challenges.
        
    
        
    Keeping people safe and informed is crucial during an emergency such as severe weather, a building intruder, or active shooter situation. Effectively communicating information to people who may be impacted by the situation can save lives. K-12 schools should consider adding discrete alerting methods, such as panic buttons, to their emergency notification plan. Panic buttons are popular emergency notification methods because they allow people to discretely notify first responders and safety personnel without alerting the entire school. A notification that draws a lot of attention, such as an alarm or strobe, can intensify the crisis by inducing panic and confusion among bystanders. This can trigger a hostile intruder to react, ultimately putting people in harm’s way. In this article, you’ll learn about six types of panic buttons that your school can use to effectively communicate and rapidly receive assistance in the event of an emergency through ACTIVATE’s integration with Intrado, a global leader in public safety. We want to thank Intrado for this helpful information, and how current technology can easily integrate with our ACTIVATE emergency notification solution!
        
    
        
    Unlike any ITDR solution you’ve seen previously, BeyondTrust Identity Security Insights, provides comprehensive visibility into your identity landscape to help detect identity-based threats and will provide the necessary remediation recommendations.
        
    
        
    AI-ready infrastructure requires a mix of processors designed for high-performance and general-purpose computing to handle demanding workloads. Learn how 4th Gen AMD EPYC can reduce tech debt and optimize AI readiness.
        
    
        
    This roundtable highlights the importance of prioritizing convenience for both citizens and government employees in the payment experience. Key topics include addressing generational preferences, modernizing payment options as a win-win solution and leveraging technology to deliver fewer steps and immediate responsiveness that residents and staff desire.
        
    
        
    Your Defense Against Cyberattackers
        
    
        
    The procurement specialist will assist the state with all procurement tasks.
        
    
        
    An era of public service that is agile, digital and customer centric.
        
    
        
    Windows 10 will reach end of support on Oct. 14, 2025 — we’re here to help.
        
    
        
    Listen Article Here
        
    
        
    During the internet’s infancy, computers were connected in Santa Monica, UC Berkeley, and at MIT in an important milestone for both California and the development of the network concept. Since that time, California has fostered an environment where technology has thrived. Today, California remains a global leader in internet technology and innovation.
        
    
        
    We think this AI-Native Network is more your speed. See how it puts your business in the fast lane.
        
    
        
    Gain more insights into the impacts of Broadcom’s acquisition of VMware and explore potential paths forward.
        
    
        
    Agile methodology traditionally encouraged in-person work. However, COVID-19 proved it was possible for even large project teams to effectively implement this approach remotely.
        
    
        
    Container based web hosting is a new way of managing, deploying and scaling applications, unlike traditional hosting where you use virtual machines (VMs) or physical servers.
        
    
        
    Traditional methods of flaw remediation are not equipped with the technology to keep pace with the rapid evolution of code generation practices, leaving developers incapable of managing burdensome and overwhelming security debt. Code security is still a critical concern in software development. For instance, when GitHub Copilot generated 435 code snippets, almost 36% of them had security weaknesses, regardless of the programming language. As it is, many developers are still unequipped with an automated method that can securely remediate issues in code.
        
    
        
    Latest News
    
The departments of Civil Rights, Public Health and Transportation all have job postings out for high-level, executive IT roles.
        
    
        
    The California Office of the Controller is looking for information about technology that could be used to manage digital currencies that find their way into the state's unclaimed property holdings.  
        
    
        
    The new system, known as the National Emergency Response Information System, replaces the 50-year-old National Fire Incident Reporting System and offers access to modern functionality.
        
    
        
    Upcoming Events
    
An evening of thought leadership, collaboration, and hands-on fun with the teams behind today’s top security platforms.
        
    
        
    Join us for a SLED IT–hosted networking event spotlighting the Semperis–Cohesity partnership — where industry-leading identity security meets next-generation data protection.
        
    
        
    Featured Speaker: Douglas Holland, Senior Solutions Engineer, Akamai