Discussions on cybersecurity mostly revolve around protecting digital infrastructure and various software systems. Physical infrastructure and its security is often overlooked. But the physical security of buildings that host the digital infrastructure and people are equally important.
Jason Bakke, a director at Chaedrol, analyzes a recent GAO bid protest decision that could impact federal contractors on GSA schedule task orders.
Joe Paiva, chairman of the Cybernomic Warfare Institute and a strategic advisor to several software companies, including HireVue, Inc., and Chelsea Kilpack, the senior global communications manager at HireVue, offer four ways to win the race for talent.
Talent management is inherently about solving everyday human problems, navigating large, complex systems to accomplish personal goals.
Targeting SDBs emphasizes the worthy goals of promoting racial equity and assisting socio-economically disadvantaged businesses, but there is another motivation for highlighting partnerships with SDBs: Doing so makes good business sense for the federal government.
With an AI-based, GPU-driven solution, organizations and governments will be able to collaborate while being armed with a proactive approach to defend from future attacks and protect America’s most sensitive data.
Ben Straub, the head of public sector for Pendo.io, explains why agencies have a new opportunity to improve how they manage their software licenses.
One way federal agencies can keep their systems current is to use digital twins for security modeling. Let’s look at this practice and why it’s gaining popularity as the preferred way to patch mission-critical systems and maintain software integrity.
We have come to see that Transactional Data Reporting (TDR) really represents the next logical step in the evolution of the Multiple Award Schedule Program, as that program responds to the dynamic commercial market.
Attrition rates for the federal government are in fact quite low once you factor out older employees who retire.
Reforms are needed to enhance efficiency, focus on outcomes, and procure innovative technology.
There’s wide consensus that SBOMs are a constructive building block for software supply chain security, perhaps especially for federal software supply chain security. But less appreciated is that there are different schools of thought on when the promises of SBOMs for federal government software supply chain security will be realized.
Agencies can automate a lot, but not the process of deciding who's right in workplace prohibited practices.
Katie Arrington, the former DoD chief information security officer for acquisition and sustainment, says dedicated funding is needed to address long-standing cyber problems in weapons systems.
Larry Allen, president of Allen Federal Business Partners, argues for why the General Services Administration’s Transactional Data Reporting effort needs more time and training of contracting officers.