:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DKHVL3HU65HY7GAJHCZIJL35EE.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DKHVL3HU65HY7GAJHCZIJL35EE.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Opinions
What new federal cybersecurity policy means for government contractors
The most controversial section calls for holding software companies liable for producing insecure code.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3JMBMYR36NHTTEXZPKWKKFPDK4.jpg)
Opinions
Navigating a multi-cloud environment under the JWCC mandate
The cancellation of the JEDI contract marked the end of single-source vendor contracts and the beginning of a multi-cloud era.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LNZGCMT4JFBVNPOJYREXEL64NE.jpg)
Opinions
A sensible approach to AI regulation
Humans will use AI as a co-pilot to make them more efficient in unwanted or criminal digital behavior, like cyberattacks or misinformation campaigns.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PVBV55HOFNEORBJLYGOY4Z3SQE.jpg)
Congress eyes new rules for tech: What’s under consideration
Lawmakers have introduced bipartisan bills to regulate tech, and it’s one of the few major policy issues where Republicans and Democrats generally align.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FUZPWGGMW5FEPEBNYJS3WRODOY.jpg)
How agencies could utilize $12.7 billion budgeted for cybersecurity
Having centralized secrets management is core to building a zero trust environment.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/P55TLK6NKNGQ7FPT5B3HBU6DYY.jpg)
Coast Guard fills cyber skill gaps with all-remote team of volunteers
The Coast Guard, an armed service within the Department of Homeland Security, recruits a volunteer body of more than 20,000 members.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GF64GL4MIRHERFXJGYOALEABBQ.jpg)
Over-classified information hampers work with allies, top Marines say
“Sometimes we get in our own way, by over-classifying, over-compartmentalizing,” Gen. David Berger said.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/F5OY5JG4Q5AHTAG3EESZ6XCJXM.jpg)
Pentagon close to making first awards on $9 billion cloud contract
The Pentagon in December tapped Amazon, Google, Microsoft and Oracle for its highly anticipated Joint Warfighting Cloud Capability contract.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2G6KREYCYVH6NLV4FESMZUZXRQ.jpg)
How observability helps federal IT pros work smarter, not harder
Observability goes beyond traditional monitoring to provide proactive insights into problems before they occur.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/B26CTTNGPZFRLB5WVJFVOG55A4.jpg)
Biden vows to wield ‘all instruments’ in fighting cyberthreats
The strategy calls out China, Russia, Iran, North Korea and others for “reckless disregard for the rule of law and human rights in cyberspace."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/T2H62V6BKFHJZGBBAOJADH2I4Q.jpg)
When it comes to network innovation, we must protect the data ‘pipes’
Because encryption has a shelf life, military networks still need to protect the data pipes that support the warfighter.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OY5PU6NEE5D5XOAE72CE3XV3ZU.jpg)
Data governance holds the key to integrity and security
A logical data fabric architecture enables dynamic and intelligent data orchestration across a distributed landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WXVIJLL7IBHTZAHBV5NQLHTO4Y.jpg)
Managing security across the new data perimeter
If the network perimeter was like a protective moat that surrounds a castle, the data perimeter is the small houses that dot the landscape.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZOHTBWAHHJFXHEO5X7UR3ENXR4.jpg)
Pentagon, intelligence community eye cloud collaboration
The Department of Defense will work closely with the intelligence community as it establishes its cloud infrastructure.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LT2VVCMIOZE6HH4FWQBJSJRSXY.jpg)
Cloud-friendly Air Force has eyes on Pentagon’s JWCC contract
CTO Jay Bonci said U.S. defense leaders "have to think about cloud as being a part of a resilience baseline."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Pentagon, private sector must partner to fight new era of cyberattacks
Over the past six months, there have been 10,666 ransomware variants identified, almost twice the total in the previous six months.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OAQHOX7RSBCTDMGSH2FTZ6TD4E.jpg)
Workforce gaps may hinder federal IT modernization
For one, telework remains a decisive factor in attrition.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)