![](https://www.federaltimes.com/resizer/cIQOuNNEYCoN7efZdLNVSi6bJBM=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AGMC34P2KRAN5DAYLAYB362HBM.jpg)
![](https://www.federaltimes.com/resizer/cIQOuNNEYCoN7efZdLNVSi6bJBM=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AGMC34P2KRAN5DAYLAYB362HBM.jpg)
![](https://www.federaltimes.com/resizer/eqEOEYPl19Ksc_BVMalx-PSTM24=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LRIVSIYAAVHHHDTDWZPI434I6E.jpg)
Opinion
Securing the backbone of our nation: critical infrastructure
Collaboration can minimize the risk of cyberattacks on U.S. critical infrastructure.
![](https://www.federaltimes.com/resizer/wlRgfNep9sF9pSlnXt8ItoJV7eA=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZH264NEBTNDCZF65QMNOLPQDHA.jpg)
Opinion
Know your customer – as long as it’s not China
A proposed 'Know Your Customer' rule seeks to stop adversaries from getting their hands on advanced U.S. cloud and AI technologies.
![](https://www.federaltimes.com/resizer/K1-pBoYc0-JSBAQaaG1fi2z7K24=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/NVUXASCMPFCGY3LWJNLVOUBTNJ.jpg)
Opinion
How to boost customer experience with secure cross-agency data sharing
The Federal Data Strategy directs agencies to assess and proactively address the procedural, regulatory, legal and cultural barriers to sharing data.
![Cloud computing illustration](https://www.federaltimes.com/resizer/xVBNnDxCEoGKp4S55LTHyk_g7aY=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4642FWVY35AJTMC4CP6IE232WE.jpg)
Opinion
National Cybersecurity Strategy compliance requires a modernized cloud
At the outset, there’s a need to blend legacy standards and practices with modern components to ensure all systems can communicate effectively.
![](https://www.federaltimes.com/resizer/AxZdNBHNyRkoV7SRvPdDEHv8OfI=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4OMTLSUNLBFFZGBWFVUCSUR7NE.jpg)
Opinion
Three steps to building an effective digital identity ecosystem
Prioritizing a modern digital identity ecosystem is long overdue.
![](https://www.federaltimes.com/resizer/NSf9-h8GnsIPwxua5ha5YsQDHSI=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YJR5QKCC2VGGTHMANNR3AADDJI.jpg)
Opinion
How interoperability benefits military, civil and commercial domains
By focusing on interoperability, new capabilities can be quickly adopted and rolled out without significant system redesign.
![](https://www.federaltimes.com/resizer/Unf8zVb1M3k224F9YmHCKHZnNzs=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/SB4WJFCTOZCIHNK4A2E3E5WFPM.jpg)
US should lead by example, not exception, on IT procurement
The federal government is the largest consumer of goods and services in the world, including more than $100 billion on IT and cyber investments each year.
![](https://www.federaltimes.com/resizer/QBy7o94TqBbbmjBGhS6ficSnF3M=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/MKXXSUK6JBCK3BK7YKF34WEUHM.jpg)
Opinion
Software transparency is key to effective government risk management
Software Bills of Materials, of SBOMS, are not an end in themselves, but a means to software transparency.
![](https://www.federaltimes.com/resizer/q3WSjzBYWaGR9Ou5QE1HRwnUuE8=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/RRF2H56X3NE7TEC553JPXY3W5Q.jpg)
Opinion
How federal IT pros can reap benefits of data observability
Observability preemptively detects anomalies and potential issues – before they become full blown outages or security issues.
![A person tries out a tablet computer next to a cloud computing and technology symbol at a trade fair in Hanover, Germany.](https://www.federaltimes.com/resizer/phfGFU1Feud9YvbP6V00H2__WZg=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ACZ22O6SLRFDBPG5TKBROFEGF4.jpg)
Pentagon eyes successor to Joint Warfighting Cloud Capability contract
"We are firmly committed to multi-cloud, multi-vendor," Pentagon CIO John Sherman said, "and this is what we’re going to be doing moving forward."
![](https://www.federaltimes.com/resizer/NG1U0jec0_ODZcfKLOLjtd-h2kU=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Opinion
A roadmap for federal CIOs in automating security assessments
There’s no room for sluggish manual processes that fail to provide real-time visibility, the author argues.
![](https://www.federaltimes.com/resizer/h1JSYppZrSzCpUAqdcfd7IadWTo=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DKHVL3HU65HY7GAJHCZIJL35EE.jpg)
Opinions
Improving the citizen experience requires treating data like a product
Thanks to advances in technology, data sharing with the goal of improving the citizen experience can be achieved, the author says.
![](https://www.federaltimes.com/resizer/NG1U0jec0_ODZcfKLOLjtd-h2kU=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4HHTBDEPMVH37L7LGPSJZIIPMI.jpg)
Opinions
What new federal cybersecurity policy means for government contractors
The most controversial section calls for holding software companies liable for producing insecure code.
![](https://www.federaltimes.com/resizer/i0Ww-KfvhgUD8L138o591dqQhhw=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3JMBMYR36NHTTEXZPKWKKFPDK4.jpg)
Opinions
Navigating a multi-cloud environment under the JWCC mandate
The cancellation of the JEDI contract marked the end of single-source vendor contracts and the beginning of a multi-cloud era.
![](https://www.federaltimes.com/resizer/9VNdximKizd5PsGcoxvxYDEVxTE=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/LNZGCMT4JFBVNPOJYREXEL64NE.jpg)
Opinions
A sensible approach to AI regulation
Humans will use AI as a co-pilot to make them more efficient in unwanted or criminal digital behavior, like cyberattacks or misinformation campaigns.
![](https://www.federaltimes.com/resizer/HSPMGy2gTh7aYCJwspmvSTd5wxg=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/PVBV55HOFNEORBJLYGOY4Z3SQE.jpg)
Congress eyes new rules for tech: What’s under consideration
Lawmakers have introduced bipartisan bills to regulate tech, and it’s one of the few major policy issues where Republicans and Democrats generally align.
![](https://www.federaltimes.com/resizer/NSY-Kg59BrQeRMmI3Bb2w8jrUCQ=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/FUZPWGGMW5FEPEBNYJS3WRODOY.jpg)
How agencies could utilize $12.7 billion budgeted for cybersecurity
Having centralized secrets management is core to building a zero trust environment.
![](https://www.federaltimes.com/resizer/xEyC56ORulRgb-RA8ODhhr9Pqrc=/800x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/P55TLK6NKNGQ7FPT5B3HBU6DYY.jpg)