information technology

Amelia Brust/Federal News Networkcybersecurity, intelligence, network, computers, technology

Air Force researchers develop a new approach to secure information delivery

An enduring challenge for military IT people: getting just the right information securely to people who need it, especially in contested environments….

Read more
FILE - The Pentagon is seen from Air Force One as it flies over Washington, March 2, 2022. The Air Force has filed criminal charges against an airman in connection with an April explosion that injured U.S. troops at a base in eastern Syria. (AP Photo/Patrick Semansky, File)

The Pentagon has a long list of to-dos from its inspector general

Read more

The pandemic’s toll on mental health should not be a security-clearance disqualifier, says national security official

Read more
Getty Images/iStockphoto/Artystartycloud

Four tough questions about implementing orchestration for your federal agency – and how to answer them

Read more

Army plans to follow Navy, Air Force in outsourcing much of its IT infrastructure

Read more
Sen. James Lankford (R-Okla.) AP/Manuel Balce Ceneta

House, Senate approve bills calling for more security measures on IT supply chain

Read more

Army looks to new acquisition authorities, modest iterations as it builds tactical network

Read more
DoD/Staff Sgt. Pete Thibodeau, U.S. Marine CorpsU.S. Army special operations forces walk to a Marine Corps MV-22 Osprey tiltrotor aircraft to conduct a high-altitude, low-opening jump with Philippine and Australian special operations forces May 7, 2014, during Balikatan 2014 at Fort Magsaysay, Philippines. Balikatan is an annual bilateral training exercise designed to increase interoperability between the Armed Forces of the Philippines and the U.S. military when responding to future natural disasters.

Army experimenting with SOF-tested equipment while building long-term tactical network plan

As it seeks a new long-term strategy for its tactical networks, Army leaders say they’re aiming to jumpstart the design process by beginning with commercial…

Read more

A crusader for managing data, at work & at home

HHS OIG’s Kirsten Dalboe, an advocate for information, labeling herself as somewhat of a data ‘enabler,’ joins Gigi Schumm on Federal News Radio’s Women…

Read more
JC Herz

Open-source software is every company’s vulnerable backbone

JC Herz, national expert on open-source software and COO and founder of Ion Channel, discusses how open-source code makes up around 80 percent of all proprietary business software. If that code doesn’t come from a reliable source or a consistent committer, it can result in huge security problems for consumers.

Read more