Free online learning for government employees.
How to Take the Next Step Toward Data Resilience
As the data environment grows more complex, agencies need to look beyond zero-trust network architecture to address the full scope of data security requirements. In this video interview, Greg Carl, Principal Technologist for U.S. Federal at Pure Storage, discusses the importance of adopting a data-centric architecture that aligns with the entire data lifecycle, from inception to decommission.
Related Videos
Nov-24-2025
After making significant investments in artificial intelligence and developing numerous use cases and proof of concepts, many a...
Turn AI Investments Into Meaningful Outcomes
Nov-24-2025
It’s one thing to develop use cases for artificial intelligence, and to launch proof-of-concepts and pilot programs to test tho...
Combine the Power of Search and Cloud to Deliver on AI
Nov-18-2025
Agencies depend on software applications to deliver reliable, effective digital services to constituents, but old-school testin...
Getting Serious About Software Testing: The Model-Based Approach
Nov-18-2025
Old-school approaches to software testing are ill-suited for today’s fast-moving and complex environments and can undermine the...
The Software Testing Advantage: Model-Based Automation
Nov-07-2025
Artificial intelligence places new demands on data management, as it pulls from multiple data sources and configurations and ma...
Scaling Up Data Governance for AI
Nov-07-2025
Artificial intelligence makes analytics more accessible to non-technical users, but places new demands on data governance. Agen...
The Right Platform to Increase Data Access
Oct-30-2025
The cyberthreat landscape has changed. Adversaries are now organized, industrialized and backed by nation-states. Agencies oper...
Combatting the New Cyberthreats With Automation and AI
Oct-30-2025
Artificial intelligence is the double-edged sword of cybersecurity, both raising the risks and providing new and more effective...
Fighting Fire With Fire: Cybersecurity in the Age of AI
Oct-23-2025
Agencies often contend with legacy tech and data silos that develop over time, jeopardizing government readiness and creating s...
How to Fix the Fragmentation That Hinders Government Readiness
Oct-23-2025
Legacy technology and data silos often develop organically over time — as IT teams address individual challenges — but they und...
Overcoming the Fragmentation That Hampers Government Readiness
Nov-14-2025
As agencies transition their AI initiatives from pilot phase to full deployment, they often discover that their data management...
Optimize Your Data for AI Operations
Oct-17-2025
The concept of zero-trust architecture has been around for a long time, yet many agencies still struggle to put it into practic...
How Observability Strengthens Zero-Trust Architecture
Oct-01-2025
Agencies today need fast, reliable, secure access to their data, but their data infrastructure is fragmented and inflexible, ma...
Data Modernization Is About More Than Infrastructure
Oct-01-2025
Too often, agency infrastructure cannot handle the explosion of data generated by a multitude of traditional and more non-tradi...
A Modern Solution to Data Storage and Management
Sep-17-2025
Agencies often spend more time wrangling their data than using it. A strong data foundation enables organizations to automate d...
Setting a Strong Foundation Realize Data’s Potential
Sep-05-2025
Artificial intelligence has allowed for new breakthroughs and efficiencies, but it’s also given bad actors a powerful tool when...
A Roadmap for Securing AI Systems and Data
Sep-05-2025
Despite the many efficiencies and breakthroughs that artificial intelligence has made possible, the technology also has ushered...
Keeping AI Data Honest: How to Secure AI Systems
Apr-11-2025
Between return-to-office mandates and an evolving threat landscape, network and security modernization initiatives have taken o...
New Modernization Priorities Put Focus on Converged Solutions
Apr-11-2025
For years, many federal agencies have looked at networking and cybersecurity as separate functions. But that approach has run i...
How to Bring Greater Efficiency to Network and Cyber Operations
Mar-19-2025
Insider threats have always been with us butut new technologies, including artificial intelligence, have made it easier for net...
How Can Agencies Strengthen Their Defense Against Insider Threats?
Mar-19-2025
Artificial intelligence and other technologies have made it much easier for end-users to manipulate data and systems in ways th...
Meeting the Challenge of Insider Threats
Mar-14-2025
For state and local agencies, the perpetual challenge of closing the IT skills gap is only growing more difficult as technology...
How Cross-Skilling Can Help Address IT Skills Gaps
Mar-14-2025
As state and local agencies have increased their reliance on data in all aspects of their operations, their need for data exper...
How to Use Cross-Skilling to Address the Data Skills Gap
Mar-10-2025
While zero-trust network architecture represents a significant shift in cybersecurity, it does not address the full scope of da...
Beyond Zero Trust: How to Strengthen Your Data Resilience
Mar-05-2025
Between digital transformation and artificial intelligence, agencies are faced with increased data vulnerability and growing at...
Increased Data Vulnerability Requires New Focus on Resilience
Mar-05-2025
Given the heightened risks to government data, agencies need to think not just in terms of security but also resilience. In thi...
Why Agencies Need to Get Serious About Data Recovery
Feb-07-2025
Whenever a constituent interacts with an agency, whether requesting information or accessing services, the quality of that enga...
How AI Can Help Agencies Deliver Better Constituent Experiences
Feb-07-2025
Whenever a constituent interacts with an agency, whether requesting information or accessing services, the quality of that enga...
How AI Can Transform Government Service Delivery
Dec-19-2024
Even as malicious actors grow more sophisticated and lethal, agencies continue to face significant obstacles in their efforts t...
State, Local Agencies Find Strength in Whole-of-State Cyber Strategy
Dec-19-2024
Data can be a strategic asset, but agencies face many obstacles trying to manage and use it securely and effectively, including...
Backup and Recovery: Data Management’s Special Ingredient
Dec-17-2024
Agencies can realize their data’s potential if they manage and use it effectively, but IT and communication barriers often stan...
How to Unlock Data’s Potential With Thoughtful Backup and Recovery
Nov-18-2024
As agencies accelerate their adoption of artificial intelligence-based solutions, they need to ensure the underlying data is AI...
How to Ensure Your Data Is AI-ready
Nov-18-2024
As agencies step up their efforts to leverage artificial intelligence (AI) and AI-based tools, they are quickly realizing they ...
How Data Hygiene Is Key to AI Initiatives
Apr-17-2023
Government workforce expert Mika Cross addresses how to make employees feel connected, no matter where they’re working from.
Building Connection Through Data
Mar-29-2022
If data were water, many organizations would say they often feel like they're drinking from a firehose: They end up soaked but ...
A Better Way to Handle Real-Time, Data-Intensive Workloads
Jan-07-2021
Using data to drive decision making can help federal agencies identify problems, improve the quality of programs and steer the ...
How Do You Become a Data-Driven Agency?
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
Building Resilience Into Your Agency
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Nov-18-2020
There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
How to Strengthen Cybersecurity (Beyond Buying New Tools)
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
Cloud Security: Defending a Pillar of IT Modernization
Jul-02-2020
Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
How to Address Security Vulnerabilities in the Development Lifecycle
Jun-08-2020
In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
5 Strategies to Enhance Security for Productivity While Remote
Mar-27-2020
If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
Federal Ransomware: A Rising Threat
Mar-26-2020
The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
Mar-13-2020
Data management is an integral part of every government agency today. Both citizens and public servants need access to trusted ...
The Next Generation of Backup and Recovery
Mar-13-2020
By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
Introduction to DDoS Attacks
Mar-12-2020
Information security may very well be the defining challenge of this era of government. How will government meet security deman...
Cybersecurity Crash Course
Mar-12-2020
By taking this course, you’ll be enrolled in six lessons. After reviewing the current state of data analytics in government, ea...