Cheryl Davis, senior director for Strategic Initiatives at Oracle, joined host Roger Waldron on Off the Shelf to discuss the many cybersecurity challenges facing contractors and the federal government.
The General Services Administration released a new cyber supply chain risk management strategy that focuses on three objectives as required by the Federal Acquisition Supply Chain Security Act of 2018.
Like with other agencies, the pandemic was a boon for advancing modernization, but as the second-largest tech enterprise in the government, the VA’s evolution is particularly striking.
The Justice Department recently refreshed policy for using a potent stick to prod federal contractors. Or maybe whack them upside the head. The Civil Cyber Fraud initiative's club is the False Claims Act.
Peter Chapman, CEO of IonQ joins host John Gilroy on this week's Federal Tech Talk to give an overview of quantum computing for federal information technology.
Rick Simon, the program manager for the Secure Cloud Management project and a contractor in the Defense Innovation Unit, said the office issued success memos to the three vendors who took part in the pilot program.
Chief data officers are relatively new additions to most agencies, but the Biden administration sees them as an essential part of some of its top priorities.
This exclusive e-book highlights some examples of how agencies are benefitting from that concept of data-in-motion to improve mission outcomes.
Former VA deputy CIO Ed Meagher says there are two overarching reasons why the Electronic Health Record Modernization effort will struggle to succeed.
The program is a partnership between the Army and Microsoft.
The agency says it doesn't want to reinvent the wheel in developing an approach to securing the broad information and communications technology ecosystem.
It is not a surprise that the pandemic sent much of the operations of the Defense Logistics Agency into the virtual realm, just like the majority of private businesses and public agencies that had the capability and type of work to do so.
Constant monitoring combined with a security approach designed in line with how the cloud operates can keep government data and systems safe from compromise.
Forthcoming strategy looks beyond IT modernization, takes multiyear approach to also reform IT policies and personnel practices.