This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In a recent interview with FedTech magazine, Whitman discusses GSA’s plans for generative AI and how it may benefit operations, the importance of collaborating with other agencies, and…
As far back as 1996, when Phrack magazine published an article by the hacker Aleph One titled “Smashing The Stack For Fun And Profit,” the world has known about memory safety vulnerabilities and how malicious actors can exploit them. Some of these threats come from relatively new vectors such as Internet of Things devices.
Close Senior Director, Public Policy & Strategy, CrowdStrike John Breeden II × John Breeden II Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space.
Close Director, Technical Solutions, August Schell John Breeden II × John Breeden II Moderator & Contributing Editor FedInsider Contributing Editor John Breeden II is an award winning journalist and reviewer who has spent 20 years working in the federal, technology and government space.
The Government Publishing Office produces and distributes official government publications to Congress, agencies, federal depository libraries and the public.
The federal government relies on forms and other documents. Many important forms sit on the web, while others sit in storage boxes. The wealth of information available to government agencies is often locked in these forms due to a lack of manpower to process and analyze them for correlations and relationships.
Last year, the Office of Management and Budget released FedRAMP guidance intended to make it easier and faster for federal agencies to put cloud solutions to work. Since the establishment of FedRAMP in 2011, cloud solutions have exploded, and they continue to grow exponentially.
Government customers expect the technology resellers they work with to employ certain sustainability practices, such as IT asset disposition, to maintain compliance with environmental, cybersecurity and human rights regulations.
Self-healing networks may ultimately deliver more value to agencies than generative artificial intelligence because theyre capable of delivering automated operational and security improvements. GenAI use cases such as DHSChat garner much of the attention, while those involving self-healing networks often fly under the radar. 23, 2025.
Critical gaps in guidance persist for chief data officers, particularly with regard to data governance for artificial intelligence, despite making progress on data maturity and mission goals.
The White House is gathering industry feedback as it drafts policies aimed at keeping the U.S. at the forefront of artificial intelligence innovation. Global competition around AI is intensifying as the technology reshapes industries, meaning the forthcoming AI Action Plan will arrive at a pivotal moment.
The National Science Foundation leads the National Artificial Intelligence Research Resource pilot, a two-year effort to better understand researchers' computing, data, modeling, software and user support needs in order to accelerate AI innovation. dominance in the AI space.
The Technology Modernization Fund jump-started two major projects of the National Archives and Records Administration that will improve customer and employee experiences. million in TMF funds, NARA will upgrade two outdated IT systems no longer supported by its vendor with new cloud-based software.
The White House has tapped Microsoft and Google to provide free cybersecurity services to approximately 2,000 “critical access” hospitals in an effort to protect healthcare in rural parts of the U.S.
While federal agencies face hurdles to digital transformation and using technology to improve processes and the citizen experience, they are making steady progress. Modernizing legacy, monolithic applications that have resided on on-premises hardware and adapting them to more modern, cloud-based environments is an ongoing project across government.
There exists a major disconnect between the trust most agencies put in their current cybersecurity strategies and their actual ability to defend themselves.
Government interest in predictive artificial intelligence for zero-trust security has increased along with the number of vulnerabilities identified on federal networks.
There is strength in diversity; that’s one of the messages delivered in the 2023 National Intelligence Strategy, which provides strategic guidance to the U.S. intelligence community. Among the major goals listed in the document are recruiting, developing and retaining a talented and diverse workforce across the entirety of the IC.
Agencies must ensure their IT infrastructure is up to the task of transforming how data is processed before they can begin leveraging high-performance computing (HPC) and artificial intelligence.
An agency’s cybersecurity is only as airtight as that of its closest industry partners. That’s the thinking behind a lengthy compliance standard the Department of Defense introduced four years ago to ensure that data and meaningful information weren’t slipping into the hands of adversaries. which differs from the original in many ways.
For the Citizen Potawatomi Nation, a tribe of nearly 40,000 in Shawnee, Okla., guarding against a potential loss of data related to its history, language and culture is a huge priority.
The State Department’s law enforcement arm, the Bureau of Diplomatic Security, defends the department and the foreign affairs community by applying cybersecurity, technology security and law enforcement expertise to help advance U.S. foreign policy and safeguard national security interests.
Native American tribes and tribal agencies looking to benefit from artificial intelligence and advancements in healthcare IT must prioritize cybersecurity and IT modernization, according to CDW technology experts, citing a recent Indian Health Service implementation as an example.
Artificial intelligence can be a valuable military tool, but several top military officials and industry experts said this week that they believe it will work best only if humans remain involved in its use.
Many government agencies lag in adoption of cloud computing and cite various obstacles as a deterrent. Let’s examine some common beliefs about cloud migration to determine which might be true and which might be misconceptions. Fact: Government Agencies Struggle with Siloed Data Siloed data is a major obstacle for government agencies.
In a pilot physical therapy program run by the Veterans Affairs Medical Center in Asheville, N.C., veterans work to save a medieval village from a fire-breathing dragon.
With the opening of its Workplace Innovation Lab, the General Services Administration seeks to better understand how hybrid work and the deployment of communication technologies will impact its employees. Located in Washington, D.C.,
Kestrel, the Department of Energy’s newest supercomputer, has taken flight. The impressive machine would have never left the nest without Hewlett Packard Enterprise, the prime contractor responsible for bringing it to life. DOE tapped HPE in late 2021 to build the new platform to tackle ongoing renewable energy and energy-efficiency research.
The Cybersecurity and Infrastructure Security Agency has expanded its Shields Up initiative with the launch of the Shields Ready campaign to improve situational cyber resilience governmentwide.
Before the advent of cloud computing and self-service tech, IT professionals often drowned customers in tech jargon. But the industry’s evolution has brought a new way to interface with technology. Today, tech is intuitive and a lot more user-friendly. A toddler can master a tablet in minutes without any instruction.
Navy IT leaders received notification from an aircraft carrier on deployment that the ship’s entire unclassified network was inoperable in April 2022. The impact is tremendous,” says Jeff Myers, deputy program manager for PMW 160, the Navy’s tactical networking program office.
As the current market shifts, some agencies are looking for virtualization alternatives. Multiple paths forward exist for agencies seeking virtual representations of physical machines — including storage, networks and servers — to use resources more efficiently, whether they’re improving existing efforts or just starting out.
The Army needs to improve its IT asset management to complement its security operations and create a more robust environment for the modern warfighter, according to CDW Government technology experts.
Cloud security posture management offers a lifeline to agencies struggling to implement cyber best practices, such as continuous monitoring, when going multicloud.
The Defense Department has been investing in 5G wireless technology for years, partnering with commercial partners to test use cases at military bases for everything from edge computing to connected vehicles, base security and more.
A surge in laptop sales expected in 2025 will impact other workstation accessories used in offices and by hybrid workers. The surge will be fueled in part by the migration to Windows 11 from Windows 10 and Microsoft’s end of support for the latter, says John Mardinly, product performance manager for connectivity technology company StarTech.com.
With the most recent Federal Information Security Modernization Act report cataloging 11 major incidents among government agencies in fiscal 2023, there is a clear need to continue improving overall cybersecurity. A key component is the federal identity credential and access management program created in 2009.
Agencies can struggle to stick to recommended three- to five-year IT refresh cycles due to their large install bases, tight budgets and legacy technologies that are not interoperable with newer ones.
To prepare for the total solar eclipse in 2017, NASA focused on technology that would keep its livestreams running for those who couldn’t see it in person. This time, the agency has looked at how to spend less money for even better service. About 12 million people watched the eclipse on NASA sites on Aug. in more than a century.
While much attention has been paid to the Department of Defense’s efforts to create a development, security and operations environment, civilian agencies’ moves toward DevSecOps have largely flown under the radar. But some are actively integrating security as a shared responsibility throughout the IT development lifecycle.
Civilian agencies teaming up with defense agencies on IT modernization efforts and sharing systems to improve efficiency are experiencing compliance challenges due to the latter’s higher-level security framework. As a result, civilian agencies may struggle to support the necessary security protocols and data encryption.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content