The Defense Information Systems Agency details four strategic imperatives, six operational imperatives and eight goals.
“There's nothing magic about construction for the Marine Corps. The challenge is the program budget process,” said Rear Adm. Dean VanderLey.
Citing low recruitment rates and readiness challenges, a coalition of health groups is urging the the Defense Department to do more about obesity.
The Marine Corps recently completed its service-wide barracks inspection. Now it can finally get after the problems that have plagued barracks for decades.
Artificial intelligence, space technology projects and integrated sensing and cyber efforts make up the majority of the Pentagon's S&T budget request.
A trial for a mass environmental injury is starting more than two years after a jet fuel leak in Pearl Harbor's drinking water poisoned thousands of people.
For DOJ employees, a recent return-to-office survey shows a clear difference in employee retention between those who can telework, and those who can’t.
The latest iteration of Naval Sustainment System-Supply moves beyond costs of readiness, tries to translate them for other "upstream" stakeholders.
Matthew Isnor, who leads cyber workforce development in DoD’s CIO’s office, said a new policy expands the number of job categories in the cyber workforce.
On its journey to Zero Trust, the DoD must secure a multi-cloud environment with a common defensive layer. Here’s how it can succeed.
The Defense Counterintelligence and Security Agency is one of the federal government’s newest HISP agencies.
Employees reported buying COVID-related services, but those turned out to be things like plumbing repairs and NordicTrack ski machines.
A 100-day implementation plan for the Army's acquisition community aims to resolve the issues that might get in the way of AI adoption
The CX director for Navy’s PEO MLB shares how her team engages employees, sailors and Marines to get feedback.
You hear a lot about zero trust controls in government tech circles. Could this approach to cybersecurity be applied to protecting space assets?