While not top of mind for agencies, the unauthorized use of artificial intelligence presents real cybersecurity risks that ...
Asset management supports security operations by increasing the visibility of what is in the IT environment. Early detection ...
Security is strengthened by reducing the attack surface, but this also makes the submission process far more user-friendly.
With networks that need to transmit significant amounts of data and support a sizable number of devices and applications, ...
The Office of Personnel Management wants agencies to design remote and telework workspaces based on their respective missions and employees’ positions and capabilities, rather than using an ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Agencies have decisions to make when it comes to next-generation ...
A few years ago, CDW restructured our cybersecurity team, and we made it similar to the one at my previous job, where I was CISO for the U.S. Senate. In the Senate, we focused on how we could be more ...
Nathan Eddy works as an independent filmmaker and journalist based in Berlin, specializing in architecture, business technology and healthcare IT. He is a graduate of Northwestern University’s Medill ...
Government can’t afford to have the same delayed response to artificial intelligence cyberthreats that it did to recent compromises because the emerging technology is both rapidly improving and easier ...