As cloud services become enmeshed within the IT enterprise, tracking costs in near-real time and determining TCO become critical. In this Special Bulletin Review, we talk with officials at DLA, OPM, Accenture and Apptio about how to make this transformative leap.
The demand for technology expertise is fueling mergers and acquisitions, particularly among defense contractors. For The Business of Defense podcast, ASMC’s Rich Brady talks with Alta Via’s Dawn Sedgley about her company’s merger with cBEYONData.
Looking for a GWAC with built-in supply chain risk management? GSA’s 2nd Generation IT contract is the ticket. In this guide, we go deep to learn about 2GIT, how it incorporates SCRM and what’s on offer from its 75-plus vendors and FAS.
Looking for a GWAC with built-in supply chain risk management? GSA’s 2nd Generation IT contract is the ticket. In this guide, we go deep to learn about 2GIT, how it incorporates SCRM and what’s on offer from its 75-plus vendors and FAS.
Recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security. Find out more in this ebook
During this exclusive webinar, moderator Tom Temin will discuss data and the concept of observability with agency and industry leaders.
As the Intelligence Community blends open source and public data with its own intel, balancing the use and development of AI tools to analyze data, and strategies for sharing data appropriately across classified teams, creates new challenges. Download this executive briefing to read more!
What do the Energy Department, Federal Housing Finance Agency, National Institute of Standards and Technology and Veterans Affairs Department all have in common? They see opportunities on the path toward zero trust, and they’re seizing them. Download this Special Bulletin Review to read more!
Listen in to this important conversation with hosts Mark Masselli and Margaret Flinter and their guests Akiko Iwasaki and Fiona Lowenstein.
Bill Rowan, the vice president of public sector at Splunk, said agencies must move toward using real-time data to understand their technology environments and make changes to address security and citizens’ needs.
The Coast Guard is prioritizing data readiness as it begins updating its network infrastructure. One big challenge it faces is how to provide connectivity to its fleet in remote operating areas.
Customer experience and cybersecurity, frequently considered separate disciplines, are actually closely connected. One simple reason is that leaving constituents’ identities and data open to purloining is not good user experience.
Federal agencies – along with most large organizations – are steadily moving to a new generation of technology in the deployment of software applications. Regular run-time code gave way to virtual machines, and now virtual is yielding to containerization managed under frameworks like Kubernetes. This methodology brings a new set of cybersecurity risks IT staffs must mitigate.
Get helpful pointers as you make 2023 FEHB selections this open season! In our exclusive Federal News Network ebook, we share details on what’s changing and what’s new, along with tips from benefits experts and links to OPM resources. Download it now!
During this exclusive webinar, moderator Justin Doubleday will discuss cybersecurity best practices and zero trust architecture with agency and industry experts.