:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZOHTBWAHHJFXHEO5X7UR3ENXR4.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZOHTBWAHHJFXHEO5X7UR3ENXR4.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LT2VVCMIOZE6HH4FWQBJSJRSXY.jpg)
Cloud-friendly Air Force has eyes on Pentagon’s JWCC contract
CTO Jay Bonci said U.S. defense leaders "have to think about cloud as being a part of a resilience baseline."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
IT & Networks
Pentagon, private sector must partner to fight new era of cyberattacks
Over the past six months, there have been 10,666 ransomware variants identified, almost twice the total in the previous six months.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OAQHOX7RSBCTDMGSH2FTZ6TD4E.jpg)
Workforce gaps may hinder federal IT modernization
For one, telework remains a decisive factor in attrition.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XXWK2JCWI5HOBDYNXX2477F6NQ.jpg)
DISA’s ‘Gray Network’ faces performance monitoring challenges
Gray networks sit between inner and outer VPN tunnels and provide an extra layer of security for encrypted classified data.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XP4G46WC7NDEJHQ73I2WTVXF2Q.jpg)
A people-first approach to recruitment, retention at federal agencies
While the private sector has recovered more than 90% of jobs lost over the past two years, the public sector has only recovered 53%.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GZEB6CJSM5DAPJCJT25RVM6GX4.jpg)
Technical debt: The cybersecurity threat hiding in plain sight
The Biden Administration’s executive order on cybersecurity in May 2021 jump started the movement toward a zero trust architecture.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/XM7ORFR6QREJHKVD2TNVNVUVOY.jpg)
Government-private sector cooperation vital in cyberwar: Senator King
King, who sits on Senate Intelligence panel that investigated Russian interference in the 2016 election, said citizens must develop their media literacy.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HVZMYQQLQRC6PGOBLK3QBZYEAA.jpg)
Will Common Access ID cards stop working on Nov. 23?
More than 78,000 Navy members and 21,000 Marine Corps members were using Common Access Cards of Nov. 10 that will become "non-operational."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/C5ZAKRQUJFBRVMC745AIBMCF3A.jpg)
How automation can solve persistent cybersecurity problems
Long-standing issues including aging data systems and alert fatigue can be addressed with automation.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ACM2V5IMMRCW5HOWEVSAC7IHDM.jpg)
Three strategies for US agencies to modernize, simplify cloud security
Deadline for the five pillars established by the Cybersecurity and Infrastructure Security Agency’s zero-trust model is fast approaching.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Q3N5T3J3UBA33L56NMZIK6OMHQ.jpg)
How Robotic Process Automation is helping federal agencies manage data
RPA and the use of intelligent bots are proving critical for agencies seeking to automate time-consuming manual processes.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3A3OXSBBINFQLP2J3N2SB26XVQ.jpg)
Did VA’s health records problems cause two patient deaths in Ohio?
Republican lawmakers want more details on the deaths and assurances that the new VA records system won't cause more harm.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YNT6DDZWDNA37FGPITRDXRZ4QU.jpg)
Robust cryptographic policies will help save military software systems
How can we build resilient software systems out of unreliable parts?
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GTEUDWH56JAEPE3NVL3MWEG3FQ.jpg)
The human touch: ‘Artificial General Intelligence’ is next phase of AI
AGI is the ability of an intelligent agent to understand or learn any intellectual task in the same way that humans do.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5H273YSWZBFKHJ5MBMOPKEDS5I.jpg)
Avoid being blindsided by CISA’s Known Exploited Vulnerabilities list
Here are three ways to predict items that are likely candidates to make it onto the CISA KEV.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/O7ASUYMXNRAPVDVS4JCQMWLM6A.jpg)
Pentagon closing in on $9B cloud contract award after scuttling JEDI
JWCC work is meant to connect the military’s most remote edge with its farthest headquarters, all while bridging classifications and other sensitivities.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/B7BKA3LYCRGUPBOBZQPNDVAC74.jpg)
Keeping the human in the OODA Loop
The task of evaluating multiple and disparate datasets is put on analysts and decision makers using tools for visualization.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Z77ARCCOGNCIVGXTPHBLZOICLU.jpg)
Using disruption to simplify your agency’s approach to data governance
By reducing the repetition and duplication of the data, you will automatically reduce the governing of it.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/F5NJDQ7GJFFTZPXAT6NKRMENLQ.jpg)