Search results
Sort by
-
'This War Exists in Cyberspace': How the Russia-Ukraine War Led to the National Cyber Strategy
The strategy calls on software developers to assume more responsibility for cyberattacks due to poorly developed code, common to the open-source community.
7m read -
DOD Has a New Cyber Resiliency Assessment Program
Defense officials tout the continuous assessment feature and scalability of the new program amid increased cyber threats.
5m read -
VA CIO: Zero Trust at the Core of Agency's Vision, Security-Focused Workforce
CIO Kurt DelBene stresses the importance of building the agency's vision and workforce upon the fundamental aspects of zero trust.
7m read -
- page
AI Gov Series: Data Insights Recap
-
Making the Case for Expanding Lung Cancer Screenings
Emerging data and technology drives new health recommendations to address disease and preventive services.
7m read -
Developing: Federal Agencies Take Action on COVID-19 Prevention Efforts
Several confirmed cases in DC area are prompting federal government to implement emergency working procedures.
7m read -
Black Pearl Boosts Software Development at Rapid Speed Across the Navy
The core of the shop's mission focuses on enhancing the service's development and acquisition amid DevSecOps transformation.
5m read -
How DHS Modified Explosive Threat Detection Tech for DARPA
The Department of Homeland Security Science & Technology Directorate doesn’t usually work with other federal agencies, but this year, the directorate modified technology that detects explosives using lasers for the Defense Department's research arm.
7m read -
Pentagon's Biggest Challenge to Zero Trust: Data Tagging
As the Defense Department implements its zero trust roadmap, data tagging and workforce education are both a challenge and an opportunity.
7m read -
Digital Memorial Adds Over 300,000 Veteran Records Using Army Data
The Veterans Legacy Memorial remembrance platform includes additional veteran profiles from DOD cemeteries ahead of Memorial Day.
7m read -
Report: The Impact of Remote Work on Women in Federal Technology
Shifting working environments and mandates across the federal government presents unique challenges and opportunities for women.
7m read -
Security Strategies For Critical Infrastructure, Connected Devices
Federal cybersecurity leaders are seeking to protect critical assets through supply chain security and new standards.
7m read