Commentary

Strategic steps to integrate AI into mission objectives

Another challenge arising during the integration of AIOps into federal agencies’ IT operations is the disruption caused by external factors. These disruptions…

Read more
U.S. Navy/MC2 Kyle CarlstromNavy

Protecting those who protected us: Raising awareness of Navy veterans’ asbestos exposure

Read more
This Feb. 27, 2018, photo shows electronics for use in a quantum computer in the quantum computing lab at the IBM Thomas J. Watson Research Center in Yorktown Heights, N.Y. Describing the inner workings of a quantum computer isn’t easy, even for top scholars. That’s because the machines process information at the scale of elementary particles such as electrons and photons, where different laws of physics apply. (AP Photo/Seth Wenig)

The quantum battle for the Indo-Pacific theater: Intersections of technology and territory

Read more
(Getty Images/iStockphoto/AzriSuratmin)CONTRACT AWARDS on missing puzzle

Is an earthquake ahead for a mainstay of federal procurement?

Read more

Digital planning, equitable access key for agency alignment with the President’s Management Agenda

Read more
Amelia Brust/Federal News Networkcustomer experience, customer service, customer support, glitch, technology, digital government, computer, phone, mobile device, CX, UX

Why the public sector is prioritizing the customer experience amid new economic challenges

Read more
DoDhelicopter, Naval Air Systems

‘If it ain’t broke, don’t fix it’ doesn’t work for today’s military

Read more
(Getty Images/iStockphoto/Rost-9D)

Digital transformation in civilian services sparks demand for new agency role

Read more

The misguided attacks on the 8(a) program must end

For half a century, the Small Business Administration’s 8(a) program has stepped in. It has provided tools for small firms entering the federal marketplace…

Read more
3D illustration of the text zero trust over black background with padlock shapes in relief. Concept of network security.

The cultural shift that’s needed to see greater ROI in cyber

As zero trust increasingly becomes the norm, especially in fed, not only can we expect to see more resilience, but a greater ROI in cybersecurity overall….

Read more

3 ways to mitigate cybersecurity risks in critical infrastructure

The ability to automatically monitor for suspicious activity is also critical. Thanks to SBOMs, organizations can look at the specific technology they have deployed and determine what controls they need to put in place to mitigate potential attacks.

Read more