


Opinion
Securing the backbone of our nation: critical infrastructure
Collaboration can minimize the risk of cyberattacks on U.S. critical infrastructure.

Opinion
Know your customer – as long as it’s not China
A proposed 'Know Your Customer' rule seeks to stop adversaries from getting their hands on advanced U.S. cloud and AI technologies.

Opinion
How to boost customer experience with secure cross-agency data sharing
The Federal Data Strategy directs agencies to assess and proactively address the procedural, regulatory, legal and cultural barriers to sharing data.

Opinion
National Cybersecurity Strategy compliance requires a modernized cloud
At the outset, there’s a need to blend legacy standards and practices with modern components to ensure all systems can communicate effectively.

Opinion
Three steps to building an effective digital identity ecosystem
Prioritizing a modern digital identity ecosystem is long overdue.

Opinion
How interoperability benefits military, civil and commercial domains
By focusing on interoperability, new capabilities can be quickly adopted and rolled out without significant system redesign.

US should lead by example, not exception, on IT procurement
The federal government is the largest consumer of goods and services in the world, including more than $100 billion on IT and cyber investments each year.

Opinion
Software transparency is key to effective government risk management
Software Bills of Materials, of SBOMS, are not an end in themselves, but a means to software transparency.

Opinion
How federal IT pros can reap benefits of data observability
Observability preemptively detects anomalies and potential issues – before they become full blown outages or security issues.

Pentagon eyes successor to Joint Warfighting Cloud Capability contract
"We are firmly committed to multi-cloud, multi-vendor," Pentagon CIO John Sherman said, "and this is what we’re going to be doing moving forward."

Opinion
A roadmap for federal CIOs in automating security assessments
There’s no room for sluggish manual processes that fail to provide real-time visibility, the author argues.

Opinions
Improving the citizen experience requires treating data like a product
Thanks to advances in technology, data sharing with the goal of improving the citizen experience can be achieved, the author says.

Opinions
What new federal cybersecurity policy means for government contractors
The most controversial section calls for holding software companies liable for producing insecure code.

Opinions
Navigating a multi-cloud environment under the JWCC mandate
The cancellation of the JEDI contract marked the end of single-source vendor contracts and the beginning of a multi-cloud era.

Opinions
A sensible approach to AI regulation
Humans will use AI as a co-pilot to make them more efficient in unwanted or criminal digital behavior, like cyberattacks or misinformation campaigns.

Congress eyes new rules for tech: What’s under consideration
Lawmakers have introduced bipartisan bills to regulate tech, and it’s one of the few major policy issues where Republicans and Democrats generally align.

How agencies could utilize $12.7 billion budgeted for cybersecurity
Having centralized secrets management is core to building a zero trust environment.
