"The education sector contains particularly vulnerable users who require special privacy protection."

- Jeff Gould, Peerstone Research

Read more

"BYOD blurs the already-gray line defining privacy expectations for Federal government employees."

- Julie Anderson, Civitas Group

Read more

"We had an unmatched opportunity to bring together a group of cyber experts to address the threats our departments and agencies face every day"

- Karen Evans, KE&T Partners

Read more

"Are stronger laws and more robust enforcement actions required to protect users from companies that put profits ahead of privacy?"

- Bradley Shear, Law Office of Bradley S. Shear

Read more

Students Are Not Products!

SafeGov launches new portal with guidance for parents, school officials and policy makers to help protect student privacy.

Read more

SafeGov.org is a forum for IT providers and leading industry experts dedicated to promoting trusted and responsible cloud computing solutions for the public sector.

Ensuring the transition to the cloud is done right is paramount. Read what's at stake.

Experts' Corner

More from our experts

Latest Commentary

  • Thursday, August 21, 2014

    DoD revisiting security guidelines for commercial cloud

    by Jared Serbu, Federal News Radio

    The Defense Information Systems Agency is undertaking a top-to-bottom review of the cybersecurity rules that guide its decisions about whether individual commercial cloud computing systems are safe enough for Defense data. DISA officials have concluded that the current process perhaps is too string...

  • Thursday, August 21, 2014

    7 tactics for a smooth cloud migration


    Relocating IT applications to the cloud can be a complex process for government agencies. Before making the jump, IT managers need to lay some groundwork, ensuring they have the right technology and security protocols in place, as well as a complete understanding of the regulatory issues affecting ...

  • Wednesday, August 20, 2014

    4 Tips: Protect Government Data From Mobile Malware

    by Julie Anderson, Civitas Group

    Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat. It often happens without you knowing. Malware takes over your smartphone or tablet, exploiting vulnerabilities and trolling for information. Perhaps the processing speed on your sm...

  • Wednesday, August 20, 2014

    Feds working to overcome challenges, early failures in public-facing mobile apps

    by Billy Mitchell, FedScoop

    As agencies continually release public-facing mobile apps to better serve American citizens, the directors and strategists behind their creation are the first to admit there is room for improvement. “In my world, smartphone apps have failed. They have not lived up to their potential. And the rea...

  • Tuesday, August 19, 2014

    Wyoming, a cloud leader? Take notes, America

    by David Linthicum, InfoWorld

    The state of Wyoming plans to discontinue most of its data center operations and move its servers to colocation facilities. Outsourcing its two data centers is an interim step to eventually moving these IT systems to public cloud services. Where Wyoming goes, the rest of the states should follow. ...

More commentary