Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • Must Read IT Blogs
    • CITizen
    • Smart Cities
    • About Insider
  • Search

Main menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • Must Read IT Blogs
    • CITizen
    • Smart Cities
    • About Insider
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Public Safety
  • Security
  • Software

Trending Now

Wi-Fi 6 vs. Wi-Fi 6E Benefits

Networking

Wi-Fi 6 vs. Wi-Fi 6E Benefits: What’s the Difference?

ST-Product Review-Breeden

Hardware

Review: Lenovo ThinkVision M15 Portable Monitor Is a Display for Anywhere

Smart city challenges

Networking

6 Challenges Smart Cities Face and How to Overcome Them

State and Local IT Influencers 2022
30 State and Local Government IT Influencers Worth a Follow in 2022
Sep 07 2022

Here are the top state and local IT leaders, podcasters and personalities to follow to stay up to date on the latest technology trends.

StateTech Fall 2022

StateTech Magazine

Current Issue | Archive
  • Twitter
  • feed

Articles By Karen Scarfone

About the Author:

Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She previously worked as a senior computer scientist for the National Institute of Standards and Technology.

Follow On:
GettyImages-874813790

Security

3 Best Practices for Safely Returning Government Devices Used at Home

Security managers should be wary of hardware and software used by teleworkers and hybrid offices.

Beetles crawling up a yellow background

Security

Why States May Find Appeal in Proactive Threat Hunting

Security

Sneak Attack: Protect Networked Printers Against Unwanted Intruders

Security

3 Tips for Selecting Threat Intelligence Services

Security

How to Tap Templates in Nessus Vulnerability Scanners

Security

Don’t Overlook Mobile Devices in Security Assessments
Cloud Environments

Cloud

How to Provision and Deprovision Cloud Environments
Cloud Computing

Cloud

The 4 Factors of Planning a Cloud Deployment

Security

How Governments Can Mitigate Data Risks
How to Encrypt Cloud Files

Security

3 Tips for Protecting Cloud-Based Data

Mobility

How to Keep Madware Away from Smartphones
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

Wi-Fi 6 vs. Wi-Fi 6E Benefits

Wi-Fi 6 vs. Wi-Fi 6E Benefits: What’s the Difference?

ST-Product Review-Breeden

Review: Lenovo ThinkVision M15 Portable Monitor Is a Display for Anywhere

Smart city challenges

6 Challenges Smart Cities Face and How to Overcome Them

IT Futurist Hero

Roughly 30 States Are Testing Adoption of Mobile Driver’s Licenses

Michael Gregg

Security

Security Operations Centers and Related Services Augment Slim Government Staff

StateTech

Technology Solutions That Drive Government

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • StateTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • FedTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get StateTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to StateTech Magazine Browse Magazine Archives
StateTech Fall 2022
Back To Top

Copyright © 2023 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information