Latest ""
Opinion
How the government came to embrace good-faith hacking of its networks
Federal agencies are inoculating public IT infrastructure by not only listening to the Internet’s Immune System, but proactively inviting healthy input.
By Casey Ellis
Opinion
The blind spots of zero trust for federal agencies
By establishing a comprehensive inventory of assets in IoT/OT, cryptography and cloud resources, agencies can mitigate threats posed in the environment.
By Miguel Sian
Opinion
Three steps to building an effective digital identity ecosystem
Prioritizing a modern digital identity ecosystem is long overdue.
By Jordan Burris
Opinion
How interoperability benefits military, civil and commercial domains
By focusing on interoperability, new capabilities can be quickly adopted and rolled out without significant system redesign.
By Dave Martin
Opinion
The Application Generation: Agencies risk digital exodus with bad apps
Public sector leaders need to ensure their IT teams have the tools and insights required to optimize application availability, performance and security.
By Gregg Ostrowski
US should lead by example, not exception, on IT procurement
The federal government is the largest consumer of goods and services in the world, including more than $100 billion on IT and cyber investments each year.
By Cory Simpson
Biden names Kelly as director of new AI Safety Institute
By July, the institute will create “red team” testing standards for developers to ensure that AI systems are safe for consumers and businesses.
By Josh Boak
Opinion
Bridging the trust gap: Using AI to restore faith in democracy
The federal government will spend $74 billion next year on IT.
By Ali Noorani and Jennifer Pahlka
Missile defense interceptor competition enters critical design phase
The Missile Defense Agency's homeland defense interceptor competition enters critical design review stage, putting it on a path for fielding by FY27.
By Jen Judson
Opinion
How federal IT pros can reap benefits of data observability
Observability preemptively detects anomalies and potential issues – before they become full blown outages or security issues.
By Sai Krishna