Nov 15, 2025

Selected items posted on blogs during the week ending November 14, 2025

Data Solutions for Faster Aid Delivery Help eligible individuals gain quick, reliable access to vital services like food and healthcare. Learn More 

Empower Individuals and Families to Achieve Stability and Self-Sufficiency Use Data-Driven Insights to Provide Faster and Easier Access to Vital Social Services. Learn More

ROI You Can Prove: Making the Case for Modern Identity Systems Modern identity systems are critical to secure, digital-first government—but funding them takes a clear business case. This guide walks through a realistic five-year cost-benefit analysis for digital identity systems in the public sector, showing how agencies can forecast ROI, reduce fraud, and accelerate digital transformation. DOWNLOAD

Building Whole-of-State Cybersecurity: A Maturity Model for Shared Resilience This new paper outlines how states can evolve from foundational security practices to advanced, optimized operations — leveraging automation, AI, and shared intelligence to reduce risk and improve response times. DOWNLOAD 

No Wrong Door: Modernizing Digital Identity for Seamless Government Access This paper outlines how a modern IAM strategy — built on single sign-on, multifactor authentication and open standards — reduces complexity, boosts cybersecurity and delivers a better experience for both residents and staff. DOWNLOAD

See How Coordination Brings Connectivity Back After Natural Disasters  Restoring connectivity is essential to recovery. A new docufilm follows broadband crews working alongside utilities and government partners to bring communications back. Watch the Film

No Wrong Door: Modernizing Digital Identity for Seamless Government Access This paper outlines how a modern IAM strategy — built on single sign-on, multifactor authentication and open standards — reduces complexity, boosts cybersecurity and delivers a better experience for both residents and staff. DOWNLOAD

Q&A: Beyond Silos: Optimizing Whole-of-State Defense This Q&A explores how a whole-of-state approach can unify security efforts across departments, while optimizing limited resources.  DOWNLOAD