GEM

Government Management Information Sciences

Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Professional Development and Leadership
Kristy Dalton, Govtech.com
One of the lessons Kristy likes to teach is that it’s OK to have fun on government social media. However, some social media managers aren’t given the leeway to try new things. Sometimes, the best way to get your elected officials or management to allow you to embrace a particular approach is to show them solid examples of agencies that are rocking it. While it’s best to have an eye for knowing when levity is appropriate, some risk-takers have landed on their feet with even risqué posts.

Visit http://www.govtech.com/govgirl/Lighten-Up-Its-OK-to-Have-a-Little-Fun-on-Social-Media.html to view the full article online.

 
Sandra Gittlen, StateTech
As security professionals know, log management alone isn’t a solid defense against spear phishing, inside attacks and other malicious acts. Security information and event management (SIEM) software vendors heard users’ frustration with tool limitations and expanded product functionality.

Visit http://www.statetechmagazine.com/article/2016/05/new-cybersecurity-software-enhances-organizations-it-toolkits to view the full article online.

 
Geek's Corner
David Streitfeld, The New York Times
The battle for control of the living room just began in earnest. Also, the bedroom, dining room and — it’s a safe bet — the bathroom as well. Google, which knows more things about more people than any other company, organization or government in history, announced on Wednesday a new household device that will use that information to help people run their lives.

Visit http://www.nytimes.com/2016/05/19/technology/google-home-a-voice-activated-device-that-already-knows-you.html?ref=technology&_r=1 to view the full article online.

 
Jason Lange and Dustin Volz, Reuters
The U.S. Federal Reserve detected more than 50 cyber breaches between 2011 and 2015, with several incidents described internally as "espionage," according to Fed records. The central bank's staff suspected hackers or spies in many of the incidents, the records show. The Fed's computer systems play a critical role in global banking and hold confidential information on discussions about monetary policy that drives financial markets.

Visit http://www.reuters.com/article/us-usa-fed-cyber-idUSKCN0YN4AM to view the full article online.

 
Eyragon Eidam, Govtech.com
How well do you know the cloud? What are the roles and responsibilities of the companies that provide cloud services? What part does the state or local government IT organization play when it comes to cloud technology? These questions and others were at the center of a panel discussion at the Florida Digital Government Summit held May 12 in Tallahassee.

Visit http://www.govtech.com/computing/4-Issues-Governments-Should-Consider-Before-Chasing-the-Cloud.html to view the full article online.

 
GMIS International Headquarters
PO Box 27923 Austin, TX 78755 | 877-963-4647
www.gmis.org