This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In a recent interview with FedTech magazine, Whitman discusses GSA’s plans for generative AI and how it may benefit operations, the importance of collaborating with other agencies, and…
As far back as 1996, when Phrack magazine published an article by the hacker Aleph One titled “Smashing The Stack For Fun And Profit,” the world has known about memory safety vulnerabilities and how malicious actors can exploit them. Some of these threats come from relatively new vectors such as Internet of Things devices.
The Government Publishing Office produces and distributes official government publications to Congress, agencies, federal depository libraries and the public.
Government customers expect the technology resellers they work with to employ certain sustainability practices, such as IT asset disposition, to maintain compliance with environmental, cybersecurity and human rights regulations.
The federal government relies on forms and other documents. Many important forms sit on the web, while others sit in storage boxes. The wealth of information available to government agencies is often locked in these forms due to a lack of manpower to process and analyze them for correlations and relationships.
Last year, the Office of Management and Budget released FedRAMP guidance intended to make it easier and faster for federal agencies to put cloud solutions to work. Since the establishment of FedRAMP in 2011, cloud solutions have exploded, and they continue to grow exponentially.
Critical gaps in guidance persist for chief data officers, particularly with regard to data governance for artificial intelligence, despite making progress on data maturity and mission goals.
The Technology Modernization Fund jump-started two major projects of the National Archives and Records Administration that will improve customer and employee experiences. million in TMF funds, NARA will upgrade two outdated IT systems no longer supported by its vendor with new cloud-based software.
While federal agencies face hurdles to digital transformation and using technology to improve processes and the citizen experience, they are making steady progress. Modernizing legacy, monolithic applications that have resided on on-premises hardware and adapting them to more modern, cloud-based environments is an ongoing project across government.
The White House has tapped Microsoft and Google to provide free cybersecurity services to approximately 2,000 “critical access” hospitals in an effort to protect healthcare in rural parts of the U.S.
To prepare for the total solar eclipse in 2017, NASA focused on technology that would keep its livestreams running for those who couldn’t see it in person. This time, the agency has looked at how to spend less money for even better service. About 12 million people watched the eclipse on NASA sites on Aug. in more than a century.
There exists a major disconnect between the trust most agencies put in their current cybersecurity strategies and their actual ability to defend themselves.
Government interest in predictive artificial intelligence for zero-trust security has increased along with the number of vulnerabilities identified on federal networks.
There is strength in diversity; that’s one of the messages delivered in the 2023 National Intelligence Strategy, which provides strategic guidance to the U.S. intelligence community. Among the major goals listed in the document are recruiting, developing and retaining a talented and diverse workforce across the entirety of the IC.
Artificial intelligence can be a valuable military tool, but several top military officials and industry experts said this week that they believe it will work best only if humans remain involved in its use.
Many government agencies lag in adoption of cloud computing and cite various obstacles as a deterrent. Let’s examine some common beliefs about cloud migration to determine which might be true and which might be misconceptions. Fact: Government Agencies Struggle with Siloed Data Siloed data is a major obstacle for government agencies.
For the Citizen Potawatomi Nation, a tribe of nearly 40,000 in Shawnee, Okla., guarding against a potential loss of data related to its history, language and culture is a huge priority.
The State Department’s law enforcement arm, the Bureau of Diplomatic Security, defends the department and the foreign affairs community by applying cybersecurity, technology security and law enforcement expertise to help advance U.S. foreign policy and safeguard national security interests.
Native American tribes and tribal agencies looking to benefit from artificial intelligence and advancements in healthcare IT must prioritize cybersecurity and IT modernization, according to CDW technology experts, citing a recent Indian Health Service implementation as an example.
In a pilot physical therapy program run by the Veterans Affairs Medical Center in Asheville, N.C., veterans work to save a medieval village from a fire-breathing dragon.
With the opening of its Workplace Innovation Lab, the General Services Administration seeks to better understand how hybrid work and the deployment of communication technologies will impact its employees. Located in Washington, D.C.,
Kestrel, the Department of Energy’s newest supercomputer, has taken flight. The impressive machine would have never left the nest without Hewlett Packard Enterprise, the prime contractor responsible for bringing it to life. DOE tapped HPE in late 2021 to build the new platform to tackle ongoing renewable energy and energy-efficiency research.
Agencies must ensure their IT infrastructure is up to the task of transforming how data is processed before they can begin leveraging high-performance computing (HPC) and artificial intelligence.
The Cybersecurity and Infrastructure Security Agency has expanded its Shields Up initiative with the launch of the Shields Ready campaign to improve situational cyber resilience governmentwide.
Before the advent of cloud computing and self-service tech, IT professionals often drowned customers in tech jargon. But the industry’s evolution has brought a new way to interface with technology. Today, tech is intuitive and a lot more user-friendly. A toddler can master a tablet in minutes without any instruction.
Navy IT leaders received notification from an aircraft carrier on deployment that the ship’s entire unclassified network was inoperable in April 2022. The impact is tremendous,” says Jeff Myers, deputy program manager for PMW 160, the Navy’s tactical networking program office.
As the current market shifts, some agencies are looking for virtualization alternatives. Multiple paths forward exist for agencies seeking virtual representations of physical machines — including storage, networks and servers — to use resources more efficiently, whether they’re improving existing efforts or just starting out.
The Army needs to improve its IT asset management to complement its security operations and create a more robust environment for the modern warfighter, according to CDW Government technology experts.
Cloud security posture management offers a lifeline to agencies struggling to implement cyber best practices, such as continuous monitoring, when going multicloud.
A surge in laptop sales expected in 2025 will impact other workstation accessories used in offices and by hybrid workers. The surge will be fueled in part by the migration to Windows 11 from Windows 10 and Microsoft’s end of support for the latter, says John Mardinly, product performance manager for connectivity technology company StarTech.com.
With the most recent Federal Information Security Modernization Act report cataloging 11 major incidents among government agencies in fiscal 2023, there is a clear need to continue improving overall cybersecurity. A key component is the federal identity credential and access management program created in 2009.
While much attention has been paid to the Department of Defense’s efforts to create a development, security and operations environment, civilian agencies’ moves toward DevSecOps have largely flown under the radar. But some are actively integrating security as a shared responsibility throughout the IT development lifecycle.
The Department of Veterans Affairs is “playing catch-up” to agencies such as the National Institutes of Health in automating its acquisition processes, according to its chief acquisition officer.
Agencies can struggle to stick to recommended three- to five-year IT refresh cycles due to their large install bases, tight budgets and legacy technologies that are not interoperable with newer ones.
Civilian agencies teaming up with defense agencies on IT modernization efforts and sharing systems to improve efficiency are experiencing compliance challenges due to the latter’s higher-level security framework. As a result, civilian agencies may struggle to support the necessary security protocols and data encryption.
Over the past decade, Native American tribes and tribal enterprises have faced many of the same cybersecurity challenges as other organizations in both public and private sectors. The main difference, according to Dallas Breckon, federal executive account manager at CDW, is that these challenges go underreported.
The Cybersecurity and Infrastructure Security Agency is developing a software bill of materials ecosystem that companies can publish to, so agencies have greater visibility into software programming libraries, versions and underlying components.
NASA has more programs today than at any time in the agency’s history, but budgets haven’t kept up. To streamline projects, keep track of data and prevent the need for rework, the agency’s teams leverage model-based systems engineering methodology.
The Smithsonian Institution’s massive collection includes items too fragile to put on display or so complex that they’re difficult for scientists to study. Its Digitization Program Office takes these objects and creates 3D scans that preserve them for history, research and outreach to people who may not be able to visit the Washington, D.C.,
There are an estimated 311 million smartphone users in the United States, doubling as video cameras, calculators, GPS guides, flashlights, e-readers and, soon, driver’s licenses. In the near future, if a police officer pulls you over, you may not need to hand over a plastic ID card.
Cloud service providers must ensure they can integrate new federal security and privacy controls into their processes if they want to continue doing business with agencies.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content