Ideas
How enforceable are software licenses?
COMMENTARY | An ongoing federal court case suggests the ubiquitous practice of "pass-through" licensing for software sold by resellers may not have a solid legal foundation.
How to fix the military’s software SNAFU
COMMENTARY | Too many of its apps are built on code riddled with vulnerabilities—and distributed by the Pentagon itself.
Why plugging leaks sometimes means protecting leakers
COMMENTARY | Congress needs to establish a form of amnesty that, where appropriate, provides an exit ramp for individuals who have unwittingly violated the terms of a security clearance and wish to come clean.
What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructure
COMMENTARY | Volt Typhoon has compromised thousands of devices around the world since it was publicly identified by security analysts at Microsoft in May 2023.
Pump the brakes: National security concerns surround connected cars
Commentary | There is an established pattern of abuse that demonstrates the Chinese Communist Party is willing and able to conduct espionage by exerting its influence on emerging technology.
Generative AI could leave users holding the bag for copyright violations
COMMENTARY | The popularity of these tools poses questions about intellectual property and copyright protection.
Building fairness into AI is crucial – and hard to get right
The pursuit of fairness in AI is not merely an ethical imperative but a requirement in order to foster trust, inclusivity and the responsible advancement of technology.
Navigating the cyber frontier 1 year into the National Cybersecurity Strategy
COMMENTARY | As outlined in the strategy, aggressively modernizing legacy systems is critical to manage risk across government networks.
Embedding AI in tech modernization plans
COMMENTARY | Opportunities exist to accelerate AI adoption across government and use tools like the FITARA Scorecard to ensure effective implementation.
Why AI localization makes sense
COMMENTARY | Localization supports faster response times and more intelligent interactions between users and systems.
Checking in on digital government in China
COMMENTARY | Steve Kelman writes that an online system for registering complaints and comments about government services has its roots in China's imperial past.
The new March Madness
COMMENTARY | The 2024 budget has yet to pass halfway through the fiscal year.
Slowing fraud requires executive order on digital theft
COMMENTARY | It’s well past time the public sector builds a digital identity ecosystem that works for everyone.
Featured eBooks