An innovator at DHS

Steve Kelman spotlights digital transformation expert Scott Simpson of the Procurement Innovation Lab at the Department of Homeland Security

Resilience by design

COMMENTARY | How federal agencies can achieve cyber resilience via a data-centric security approach.

Uncovering the next wave of COVID-19 relief fraud through AI

COMMENTARY | Many agencies are increasingly relying on AI to uncover fraudulent activities, and the emerging technology could hold the key to help recoup billions of dollars siphoned off from the federal government in pandemic relief scams.

Modernizing secure code for the public sector

COMMENTARY | Refactoring legacy applications into modern programming languages yields not only memory-safe applications but typically produces smaller code bases, notably faster runtimes and increased scalability.

Federal agencies need to rethink culture in the fight against ransomware

COMMENTARY | Focusing efforts on risk management isn't about checking boxes – it's about building and changing agency culture.

Why SD-WAN is the future of government networks

COMMENTARY | The revolution in IT workloads requires flexible, adaptable networking solutions.

The case for making Direct File permanent

COMMENTARY | The Direct File pilot was a landmark event for the tax system and a victory for the civic technology movement. Now its time to make the program available to all taxpayers on a permanent basis.

4 ways generative AI will improve the federal government

COMMENTARY | Exciting advancements are ahead for the federal government by tapping generative AI, from streamlined operations to improved national security

The long tail of modernization

Why CX is an ongoing journey and not a destination.

How enforceable are software licenses?

COMMENTARY | An ongoing federal court case suggests the ubiquitous practice of "pass-through" licensing for software sold by resellers may not have a solid legal foundation.

How to fix the military’s software SNAFU

COMMENTARY | Too many of its apps are built on code riddled with vulnerabilities—and distributed by the Pentagon itself.

Why plugging leaks sometimes means protecting leakers

COMMENTARY | Congress needs to establish a form of amnesty that, where appropriate, provides an exit ramp for individuals who have unwittingly violated the terms of a security clearance and wish to come clean.

What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructure

COMMENTARY | Volt Typhoon has compromised thousands of devices around the world since it was publicly identified by security analysts at Microsoft in May 2023.

Pump the brakes: National security concerns surround connected cars

Commentary | There is an established pattern of abuse that demonstrates the Chinese Communist Party is willing and able to conduct espionage by exerting its influence on emerging technology.

Generative AI could leave users holding the bag for copyright violations

COMMENTARY | The popularity of these tools poses questions about intellectual property and copyright protection.

Building fairness into AI is crucial – and hard to get right

The pursuit of fairness in AI is not merely an ethical imperative but a requirement in order to foster trust, inclusivity and the responsible advancement of technology.

Navigating the cyber frontier 1 year into the National Cybersecurity Strategy

COMMENTARY | As outlined in the strategy, aggressively modernizing legacy systems is critical to manage risk across government networks.