Open Government Part 3: Records Management, Public Trust, and Agency Effectiveness
In our first article in this series about open and transparent government initiatives, we asked why U.S. government agencies seem to be growing less open (meeting fewer records requests than previously). In our second article, [...]
Working with a FedRAMP Certified Technology Provider
As federal agencies increasingly turn to cloud-based solutions to meet their growing technological and operational needs, selecting the right cloud service provider (CSP) for any given application is critical. To help with this complex, high-stakes [...]
The Power, Potential, and Limitations of AI in Government Records Management
The Power of AI: Artificial Intelligence (AI) is increasingly being integrated into many sectors of government, and records management is no exception. For instance, the National Archives and Records Administration (NARA) has tested AI to [...]
How Cloud-Based Records Management Tools Can Ease IT Burden
Administering IT assets and technology investments is a critical yet resource-intensive process. Here, we’re talking about the administrative side of IT—planning, deploying, maintaining, and eventually decommissioning IT assets—rather than the day-to-day use of the technology. [...]
Understanding the Importance of FedRAMP Certification for Records Management Vendors
The Federal Risk and Authorization Management Program (FedRAMP) is a critical benchmark for technology vendors providing services to U.S. government agencies. It provides a standardized approach to security for the cloud products and services used [...]
More Real-World Applications of AI in Government Records Management
Government agencies around the world are leveraging AI technologies to enhance their operations, improve the efficiency of public services, and better manage data and records. We wrote last year about some of the ways government [...]
Strengthening the Weakest Link: How to Make Your End-Users Less Likely to Fall For Cybersecurity Tricks And Traps
In the world of cybersecurity, technology matters less than people. End-users are both the most vital element—and the weakest link—in the chain of cyber defenses. As ISACA, a professional membership organization for IS/IT pros, writes, [...]