Emergency management teams currently deploy technologies like drones, sensors, robotics and cloud- based tools to improve preparation and response efforts. But these technologies do not fully possess the two key attributes that underpin all phases of emergency management: speed and the ability to account for limitless variables. Cutting-edge technology like quantum computing is uniquely capable of addressing these variables.
In decades past, communications breakthroughs like instant messaging and video conferencing have helped close that gap, but augmented reality (AR) is a new emerging technology that can provide an even greater sense of presence and cohesion within distributed teams.
Government funding, policy and legislation, such as the $1.3 billion budget proposal for FY24 to bolster and train the federal health care workforce, the President’s Management Agenda (PMA) and the 21st Century Integrated Digital Experiences Act (IDEA) are united by the imperative to strengthen and empower the federal workforce.
For more than 15 years, the number of companies working with the Department of Defense has been declining — and the trend has continued in recent years. Recent analysis suggests DoD has lost more than 25% of its contractors over the past decade.
In the world of quantum computers, the need for an advanced approach to cybersecurity is more necessary than ever. As a result, thought leaders in the post-quantum cryptography (PQC) space are looking for ways to…
CISA’s zero trust model provides federal agencies with a clear path to follow, making it another vital tool to help define the zero trust journey — one that will help them meet the September 2024 deadline set by the Office of Management and Budget's memo.
We’re living in an era of “modernization inflation,” in which agencies must keep up with the rate of innovation or risk falling behind. A bold modernization goal can pay dividends in helping agencies harness the latest technology and stay ahead of industry trends.
A purpose-built, on-premises collaboration solution gives your organization a secure environment to centralize the technology tools, content and communications needed to respond to and audit any incident that threatens your mission.
In January 2022 the Office of Management and Budget published its M-22-09 memorandum on zero trust that mandated compliance with specific goals by the end of fiscal 2024.
SecOps teams must be able to determine what is blatantly spyware. The software is probably sending out specific information and capturing data. All this type of data — application, network and device information — must be correlated and analyzed for a better understanding of what’s going on within the entire IT infrastructure.
Section 752 of the Consolidated Appropriations Act of 2023 signals a new chapter in pursuing digital accessibility for federal agencies. The act requires federal agencies to meticulously report on the accessibility of their information and communication technology (ICT), creating an exigency that might still be unanticipated by many.
As a response to the spate of high-profile software supply chain attacks, including SolarWinds and Log4J, President Biden’s cybersecurity Executive Order 14028, released in 2021, signaled the beginning of the administration’s focus on software supply chain security. The executive order demonstrated the administration’s serious commitment to the issue and made clear to software companies that they had a vital role in maintaining security.
The White House’s National Cybersecurity Strategy is primarily written for and designed to guide federal government officials. Yet the latest release of the strategy is remarkable for the commitments it makes to the private sector on a range of cybersecurity issues.
As cyberattacks continue to grow both in number and sophistication, government agencies are struggling to keep up with the ever-evolving threat landscape.
Emily Murphy, the former administrator of the General Services Administration and now a senior fellow with the Center for Government Contracting at George Mason University, makes the case for why cost and pricing data at the main contract level is useless and burdensome.