By Gary Hix, Chief Technology Officer for Hitachi Vantara Federal In a determined effort to prioritize sustainability and combat climate change, Federal agencies have made significant progress since President Biden issued an executive order on Federal sustainability over a year ago. Guided by the government’s influential scale and procurement power, this order sets ambitious goals […] […]
In recent years, Federal Agencies have been challenged by a growing list of adversaries operating in an increasingly complex cyber threat landscape. At the same time, Agencies have been diligently modernizing their information technology (IT) environments to accommodate evolutionary cloud technology trends and a more mobile and remote workforce. These dynamics have combined to create […] […]
By Eric Adams, Geospatial Functional Lead, GDIT As climate change has been accepted as a scientifically undeniable and universally recognized challenge, geospatial intelligence teams are applying the tools of their trade to mitigate its effects and address its impacts on aspects of our environment. Today, like nearly every other industry around the world, artificial intelligence and […] […]
I’ve always been a very private person, but it’s time for me to stop being such a coward – I have OsteoArthritis. I guess it can happen to anybody – even Steve O’Keeffe. In fact, one in seven American adults has OA – that’s more than 32 million folks stateside. So, I’ve spent the last two years […] […]
By Jim Richberg, Fortinet Public Sector Field CISO The era of the global internet is over. The new reality is a fragmented digital landscape where nation states have largely been left to their own devices to create patchworks of policies to defend against threat actors who have become faster, stronger and more ruthless. To combat […] […]
By Gaurav Pal, Principal and Founder, stackArmor, Inc. Disruptions in gasoline supplies due to the cyberattack on the Colonial Pipeline in May 2021 transformed cybersecurity attacks from an “online problem” to a national security concern. This seminal event resulted in the release of the National Cybersecurity Strategy (NCS) on March 2, 2023. The NCS brought […] […]
By Ozan Unlu, CEO, Edge Delta In fall 2022, Splunk issued its annual State of Observability Survey and Report, highlighting the increasingly critical role observability plays in enabling multi-cloud visibility and dramatically improving end-user experiences. Growth in observability – or the ability to measure a system’s current state based on the data it generates – […] […]
By Melissa Trace, Vice President, Global Government Solutions at Forescout Technologies Research from Forescout’s Vedere Labs reveals that government organizations have the highest percentage of devices with risk. Between the explosion of remote work, the ongoing ransomware epidemic and the fact that the number of non-traditional assets – such as IoT, OT and IoMT – […] […]
By Miles Fuller, Head of Government Solutions, TaxBit The collapse late last year of FTX, one of the largest centralized cryptocurrency exchanges in the world, and the resulting contagion has garnered the interest of U.S. lawmakers and regulators. After years of talking about crypto, they now seem to be interested in more than just hinting […] […]
As we tilt into this new year in the Federal IT events community, I wanted to point to the absurdity of Federal gift giving regulations. We all know that industry’s not allowed to give a Fed food and drink worth more than $20 at one time – and no more than $50 in a year. […] […]
By Dave Levy, Vice President, Amazon Web Services The FedRAMP Authorization Act was recently signed into law as part of the defense authorization bill, a signal that cloud technologies continue to have a permanent place in helping U.S. government agencies deploy secure and innovative solutions to accomplish their missions. Through this legislation, policy leaders on […] […]
Despite recent progress, IT-related problems continue to hinder work at government agencies. These include data in silos across locations that complicate information-gathering and decision-making, rising cyber threats targeting employee logins, and legacy systems that don’t adapt easily to mission changes or remote work environments. Accordingly, a recent study by Gartner found that while 72 percent […] […]
By Petko Stoyanov, Global Chief Technology Officer, Forcepoint Many Federal agencies are considering investing in zero trust network access (ZTNA) solutions. But not all ZTNA applications are equal, and it’s important agencies invest in ZTNA solutions that will allow them to align and meet the “Optimal” stage outlined in the Cybersecurity and Infrastructure Security Agency’s […] […]
By Willie Hicks, Federal Chief Technologist at Dynatrace Whether users are shopping on Amazon or another top company’s website, they expect certain website performance and features availability to ensure a positive customer experience (CX). Users expect to access product links and conduct transactions seamlessly and swiftly. They expect to navigate to comprehensive product specifications or […] […]
By Michael Zurat, Senior Solutions Architect, General Dynamics Information Technology (GDIT) 5G technology has the potential to be transformative for businesses and consumers, as well as for the U.S. government. 5G can provide the enabling connectivity to drive digital transformation from a paperless digital Internal Revenue Service, to enabling the Postal Service to outperform Amazon, […] […]
By: Bob Venero, President & CEO, Future Tech Enterprise, Inc., Ftei.com Manufacturing is all about operational efficiency – make it quicker, cheaper, and ship it for less. For this reason, the industry has long been at the forefront of the application of new technologies, finding creative solutions to increase production and decrease costs. Basically, how […] […]
By Dr. Jim Matney, Vice President and General Manager, DISA and Enterprise Services, at General Dynamics Information Technology (GDIT) As almost any cybersecurity professional would tell you, you can’t reliably know what vulnerability a hacker will find and exploit. To avoid an attack, your defenses must be right 100 percent of the time. The hacker […] […]
The Accenture Federal Technology Vision highlights four technology trends that will have significant impact on how government operates in the near future. Today we look at Trend #4, Computing the Impossible: New Machines, New Possibilities. When Intel launched the Intel® 4004 processor in 1971, the first general-purpose programmable processor was the size of a small fingernail and held […] […]
The Accenture Federal Technology Vision 2022 highlights four technology trends that will have significant impact on how government operates in the near future. Today we look at Trend #3, The Unreal: Making Synthetic Authentic. Artificial intelligence (AI) is one of the most strategic technologies impacting all parts of government. From protecting our nation to serving its citizens, AI […] […]
By Bob Eckel, CEO, Aware Confirming the identification of the world’s most wanted man leaves no margin for error. In fact, when Osama bin Laden was killed in 2011, he was identified through facial recognition which was later confirmed by DNA analysis. Few would argue this was not a commendable use of biometrics. Since then, […] […]
Archives
- June 2023 (1)
- May 2023 (3)
- April 2023 (1)
- March 2023 (2)
- February 2023 (2)
- January 2023 (2)
- December 2022 (2)
- November 2022 (2)
- October 2022 (6)
- September 2022 (7)
- August 2022 (1)
- June 2022 (3)
- April 2022 (2)
- March 2022 (6)
- February 2022 (3)
- January 2022 (1)
- December 2021 (3)
- November 2021 (5)
- October 2021 (2)
- September 2021 (2)
- August 2021 (7)
- July 2021 (2)
- June 2021 (3)
- May 2021 (3)
- April 2021 (5)
- March 2021 (1)
- February 2021 (1)
- January 2021 (1)
- December 2020 (3)
- November 2020 (2)
- October 2020 (6)
- September 2020 (1)
- July 2020 (3)
- June 2020 (3)
- May 2020 (2)
- April 2020 (1)
- March 2020 (2)
- February 2020 (2)
- January 2020 (3)
- November 2019 (1)
- October 2019 (1)
- July 2019 (2)
- June 2019 (1)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (2)
- September 2018 (1)
- July 2018 (1)
- May 2018 (2)
- March 2018 (2)
- February 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (5)
- September 2017 (5)
- August 2017 (4)
- July 2017 (5)
- June 2017 (3)
- May 2017 (5)
- April 2017 (9)
- March 2017 (13)
- February 2017 (9)
- January 2017 (7)
- December 2016 (10)
- November 2016 (14)
- October 2016 (17)
- September 2016 (19)
- August 2016 (15)
- July 2016 (16)
- June 2016 (17)
- May 2016 (21)
- April 2016 (21)
- March 2016 (20)
- February 2016 (12)
- January 2016 (14)
- December 2015 (7)
- November 2015 (6)
- October 2015 (6)
- September 2015 (7)
- August 2015 (9)
- July 2015 (8)
- June 2015 (9)
- May 2015 (8)
- April 2015 (8)
- March 2015 (10)
- February 2015 (6)
- January 2015 (6)
- December 2014 (2)
- November 2014 (4)
- October 2014 (6)
- September 2014 (3)
- August 2014 (1)
- July 2014 (6)
- June 2014 (6)
- May 2014 (7)
- April 2014 (5)
- March 2014 (6)
- February 2014 (5)
- November 2013 (2)
- October 2013 (3)
- September 2013 (3)
- August 2013 (1)
- August 2011 (1)
Subscribe
Want the latest on the Mobile Work Exchange? Sign up today.