![](https://www.federaltimes.com/resizer/cIQOuNNEYCoN7efZdLNVSi6bJBM=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AGMC34P2KRAN5DAYLAYB362HBM.jpg)
![](https://www.federaltimes.com/resizer/cIQOuNNEYCoN7efZdLNVSi6bJBM=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AGMC34P2KRAN5DAYLAYB362HBM.jpg)
![](https://www.federaltimes.com/resizer/eqEOEYPl19Ksc_BVMalx-PSTM24=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LRIVSIYAAVHHHDTDWZPI434I6E.jpg)
Opinion
Securing the backbone of our nation: critical infrastructure
Collaboration can minimize the risk of cyberattacks on U.S. critical infrastructure.
![](https://www.federaltimes.com/resizer/wlRgfNep9sF9pSlnXt8ItoJV7eA=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZH264NEBTNDCZF65QMNOLPQDHA.jpg)
Opinion
Know your customer – as long as it’s not China
A proposed 'Know Your Customer' rule seeks to stop adversaries from getting their hands on advanced U.S. cloud and AI technologies.
![](https://www.federaltimes.com/resizer/WWcrH0XLPEftXPJF9ZmjUngpEUs=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OAQHOX7RSBCTDMGSH2FTZ6TD4E.jpg)
Workforce gaps may hinder federal IT modernization
For one, telework remains a decisive factor in attrition.
![](https://www.federaltimes.com/resizer/oaY3iyk0KA2rRUJbbBjUWOKwVjk=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)
DISA’s ‘Gray Network’ faces performance monitoring challenges
Gray networks sit between inner and outer VPN tunnels and provide an extra layer of security for encrypted classified data.
![](https://www.federaltimes.com/resizer/czyWY692FKUVW5CwJvTCfJW89Do=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XP4G46WC7NDEJHQ73I2WTVXF2Q.jpg)
A people-first approach to recruitment, retention at federal agencies
While the private sector has recovered more than 90% of jobs lost over the past two years, the public sector has only recovered 53%.
![](https://www.federaltimes.com/resizer/48pg5hpVe9Qe5uReaBHPM-l8hOo=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GZEB6CJSM5DAPJCJT25RVM6GX4.jpg)
Technical debt: The cybersecurity threat hiding in plain sight
The Biden Administration’s executive order on cybersecurity in May 2021 jump started the movement toward a zero trust architecture.
![](https://www.federaltimes.com/resizer/oWXb1bZ2oPL-3gpDmw3Yips1Qeo=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XM7ORFR6QREJHKVD2TNVNVUVOY.jpg)
Government-private sector cooperation vital in cyberwar: Senator King
King, who sits on Senate Intelligence panel that investigated Russian interference in the 2016 election, said citizens must develop their media literacy.
![](https://www.federaltimes.com/resizer/j6Wumb8MsiWWVf_mfr3ScitLago=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HVZMYQQLQRC6PGOBLK3QBZYEAA.jpg)
Will Common Access ID cards stop working on Nov. 23?
More than 78,000 Navy members and 21,000 Marine Corps members were using Common Access Cards of Nov. 10 that will become "non-operational."
![](https://www.federaltimes.com/resizer/jUDUwND3hCHJf8dhSCfh7bIY9ik=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/C5ZAKRQUJFBRVMC745AIBMCF3A.jpg)
How automation can solve persistent cybersecurity problems
Long-standing issues including aging data systems and alert fatigue can be addressed with automation.
![](https://www.federaltimes.com/resizer/OgKB1aKbvmaHV-m5yj8TJ0ApN7U=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ACM2V5IMMRCW5HOWEVSAC7IHDM.jpg)
Three strategies for US agencies to modernize, simplify cloud security
Deadline for the five pillars established by the Cybersecurity and Infrastructure Security Agency’s zero-trust model is fast approaching.
![](https://www.federaltimes.com/resizer/BqHTKbxqvvXMY3LpFl7OWUhtcew=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Q3N5T3J3UBA33L56NMZIK6OMHQ.jpg)
How Robotic Process Automation is helping federal agencies manage data
RPA and the use of intelligent bots are proving critical for agencies seeking to automate time-consuming manual processes.
![](https://www.federaltimes.com/resizer/T_0UNoGenx5sCCyClKEnJkyQMJ0=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3A3OXSBBINFQLP2J3N2SB26XVQ.jpg)