![](https://www.federaltimes.com/resizer/Nagv8DFss6MzGRro6ry3rU83uyk=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4V7OZPJ4DNH6FLIS6U7CY3LODQ.jpg)
Latest ""
![](https://www.federaltimes.com/resizer/Nagv8DFss6MzGRro6ry3rU83uyk=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4V7OZPJ4DNH6FLIS6U7CY3LODQ.jpg)
![](https://www.federaltimes.com/resizer/JVAqe5gxaSifhak5oFYgd0ZeL9M=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AGMC34P2KRAN5DAYLAYB362HBM.jpg)
Opinion
How to establish an effective data management governance program
A compliance program should be able to clearly articulate the criteria for evaluating success, highlighting the technology or processes required.
By Joah Iannotta
Opinion
Navigating fed cybersecurity: Strategies to achieve network compliance
The complexities of federal cybersecurity guidance necessitate a multifaceted approach to achieving compliance.
By Matt Honea
Opinion
Top tech considerations for federal agencies in the modern workplace
Workers are the first line of defense for keeping data secure, so the equipment they use to perform their duties must meet the rigid security requirements.
By Emily Kimmett
Supreme Court weakens federal regulators, overturning Chevron doctrine
Billions of dollars are potentially at stake in challenges that could be spawned by the high court’s ruling.
Opinion
How to harness AI and Zero Trust segmentation to boost cyber defenses
More than half of leaders who have implemented AI say that it's helped accelerate incident response times, highlighting the technology's potential.
By Gary Barlet