Oct 21, 2015 /

Introducing Adobe’s Digital Government Survey

But how many US citizens are actually engaging with the government digitally? What factors are most important to citizens when using government tools online, and do they see this as a budget priority? To answer these questions Adobe commissioned a study to explore how citizens interact with their government online, and how they feel about the digital government tools currently available to them.

Oct 20, 2015 /

Adobe Partners with Motorola to Improve Public Safety

Today, Motorola Solutions, a leader in law enforcement technology, announced the development of new solutions powered by Adobe software to securely store, review, manage, and share digital evidence.

Oct 5, 2015 /

In Service of Creativity

Adobe is excited and honored to recognize some of the best creative work we’ve seen over the past year with a special set of awards targeted at exceptional Public Sector agencies. The quality of this year’s many submissions clearly illustrates how design-centric innovation has become a core strategic consideration for engaging citizens and adapting to the continuous “consumerization” of government services.

Oct 5, 2015 /

Data Security from the Inside Out

This week we have called attention to issues relating to cyber security in the workplace as part of National Cyber Security Awareness Month, which is essential given that agencies have reported 15 percent more information security incidents between fiscal year 2013 and 2014.

Oct 5, 2015 /

Document Security Built for Life

Content privacy, security and compliance are all important aspects of government business. Sensitive content is frequently exchanged between agencies, contractors, industry and other vendors within the supply chain.

Oct 5, 2015 /

Let’s Get Physical about Data Protection

October marks the observance of National Cyber Security Awareness Month (NCSAM). Now in its 11th year, attention among federal agencies to this month-long initiative has never been more pressing. The insider threat has become an essential component of every agency’s comprehensive security program, and these threats are one of the most potentially dangerous forms of network compromise.