Ideas

Securing open source software is a team sport

COMMENTARY: Public-private partnerships offer a path to solving the persistent problem of open source software security.

Ideas

VA acquisitions asks vendors to show their work

COMMENTARY: The principle of "do, don't say" could be catching hold at the Department of Veterans Affairs.

Ideas

Cyber meets warfare in real time

COMMENTARY: Why Hezbollah's exploding pagers signal a dangerous new era for global businesses.

Ideas

Organizing to meet the most urgent threats

COMMENTARY: The government’s recognition of the need for asset visibility has kickstarted the process by which agencies have begun to focus on contextualizing assets in their environments, prioritizing threats and then taking action to stay protected.

Ideas

The migration challenge

COMMENTARY: Upgrading legacy systems to modern infrastructure is critical, but migrating workloads and applications introduces potential vulnerabilities that must be addressed.

Ideas

How FedRAMP is evolving to meet the challenges of the cloud computing market

Updates to federal cloud security policy are laying the foundation for a more secure and resilient cloud ecosystem.

Ideas

Why human-centered design is the key to better CX

COMMENTARY: Better, more thoughtful technology can spark innovation in delivery of citizen services.

Ideas

Why the IRS needs a new accountability program

COMMENTARY: The tax agency should borrow from the Social Security Administration's SecurityStat effort to measure performance and promote internal transparency.

Ideas

Lessons from the CrowdStrike outage

COMMENTARY: Agencies can mitigate impacts of future outages by putting IT risks front and center and by understanding the incident response requirements of their vendors.

Ideas

How biometrics can improve the security and efficiency of air travel

COMMENTARY: While we must ensure that biometric technology protects privacy and improves accuracy, abandoning this technology altogether would threaten our national security and set aviation screening back decades.

Ideas

Strengthening public-private collaboration in the post-Chevron era

Congress will need to foster a deeper understanding of complex, bleeding-edge technology issues to craft effective regulations that will endure scrutiny.

Ideas

How to be data-ready for AI adoption

COMMENTARY: Outcomes are only as reliable as the data supporting generative AI tools.

Ideas

China leans into using AI − even as the US leads in developing it

The Chinese government has made extensive use of existing AI technologies, including for surveillance.

Ideas

How fusion centers protect the country

COMMENTARY: The centers provide the technology and tools needed to identify threats that lie beyond the walls of the organization.

Ideas

The coming cyber reckoning for federal contractors

Contractors face a 90-day deadline to prove their cybersecurity compliance as awards for the OASIS+ vehicle start to fall and that is a precursor to broader industry-wide requirements, DTS CEO Edward Tuorinsky writes.

Ideas

Following the federal cybersecurity money trail

COMMENTARY: Cybersecurity is crucial to everything from massive critical infrastructure projects to the safe operation of small businesses and increasingly to the private life of every American.

Ideas

Future-proofing government data

COMMENTARY: As AI becomes increasingly integrated into governmental operations, the cost of neglecting data readiness could be catastrophic.

Ideas

Why unified observability is key to better UX

COMMENTARY: The technology also helps shed light on blind spots introduced by zero trust cybersecurity strategies.

Ideas

How to maximize AI's potential for government

COMMENTARY | Invest, innovate and evolve to meet this critical moment to harness the productive potential of artificial intelligence.