
What Is Continuous Threat Exposure Management? A Risk-Driven Approach for State and Local Agencies
Continuous Threat Exposure Management (CTEM) is emerging as a risk‑driven framework for state and local governments, shifting focus from sheer vulnerability counts to business‑impact exposure. CDW outlines a five‑stage process—scoping, discovery, prioritization, validation, and mobilization—that integrates asset inventory, threat data, and business context. By simulating attacks, agencies can trim thousands of theoretical flaws to a handful of exploitable paths, enabling targeted remediation. The approach promises measurable risk reduction while aligning security metrics with executive expectations.

Phoenix Taps Adobe DX To Unify Websites, Streamline Services
Phoenix consolidated 44 department websites into a single phoenix.gov portal using Adobe Experience Manager, completing a four‑year transformation that shifted the site to a resident‑first model. The new platform lets roughly 60 departments manage content directly, cutting page‑update times from...

What Transformational Government Looks Like When the Buzzwords Fade
State and local governments are urged to prioritize foundational work—standardization and modernization—before chasing AI and automation. CDW experts Neil Graver and Steve Horvath argue that aligning people, processes, and platforms reduces legacy debt and improves citizen services. They stress human‑centered...

The NIST OSCAL Framework for State and Local Governments
NIST’s Open Security Controls Assessment Language (OSCAL) gives state and local governments a machine‑readable alternative to spreadsheets, Word files, and PDFs for security‑control documentation. By encoding controls, implementations, and assessment results in JSON, XML or YAML, agencies can automate validation,...

How AI Service Hubs Will Redefine Citizen Interactions in 2026
Governments are moving beyond simple AI chatbots toward AI service hubs that connect conversational interfaces directly to back‑office systems, allowing citizens to complete full transactions in one interaction. These hubs promise greater accessibility, multilingual support, and equity by delivering services...

State and Local Governments Can Avoid Costly Mistakes in Application Modernization
State and local governments are accelerating application modernization without fully assessing security and interdependencies, leading some to halt cloud migrations. CDW’s chief architect Greg Peters warns that legacy mainframes and tightly coupled applications require coordinated upgrades across multiple systems. To...

Identity Is the New Perimeter for State Government Cybersecurity
State and local governments are shifting from perimeter‑based defenses to an identity‑first security model, as highlighted in the State CIO Top 10 Priorities for 2026. The article argues that who a user—or nonhuman account—is matters more than where they connect,...

Utah Advances Policy-First Digital Identity Framework Centered On Individual Control
Utah is drafting comprehensive State‑Endorsed Digital Identity (SEDI) legislation that puts individuals in control of their cryptographic keys while the government acts only as an endorser. The policy relies on open standards, supports both long‑lived and short‑term credentials, and preserves...