


Opinion
Navigating fed cybersecurity: Strategies to achieve network compliance
The complexities of federal cybersecurity guidance necessitate a multifaceted approach to achieving compliance.

Cybersecurity
Quieting Discord: A new frontier in military leaks and extremism
From secret Pentagon leaks to radicalization in the military community, Discord is continuing to grapple with keeping bad actors off the popular platform.

Russian hackers infiltrate Veterans Affairs via Microsoft account
The state-sponsored hacker infiltrated a platform called Microsoft Azure Government, which provides storage, databases and other services to the VA.

Air Force, Space Force join Army for Bring-Your-Own-Device enrollment
Fifty thousand Army enrollees are using the service since that effort began as a pilot program in 2022.

Top 5 potential uses, pitfalls for generative AI in federal government
We believe Multi-Agent Systems are the only viable approach to bringing generative AI into the U.S. government in a managed manner.

Pentagon zero-trust office aims to start data tagging, labeling in ′24
The Defense Department is seeking to demo a solution, even an imperfect one, to a longstanding problem.

Opinion
Embrace AI to maintain global talent pool for US innovation, security
The U.S. stands at a crossroads, where the nurturing of global talent is not merely an option but a strategic imperative.

Opinion
Top tech considerations for federal agencies in the modern workplace
Workers are the first line of defense for keeping data secure, so the equipment they use to perform their duties must meet the rigid security requirements.

Opinion
Improving mobile device security is imperative ahead of Election Day
Government employees and election officials must be prepared to combat these threats to safeguard sensitive information and prevent disinformation.

Opinion
Beyond TikTok: Navigating the cybersecurity landscape of tomorrow
The future includes protecting our digital and societal fabric against threats.

Zero trust at DoD hinges on thawing stubbornness in the workforce
Resnick said he has seen the spirit of innovation in leadership, but it’s the mid-tier of the workforce that sometimes pushes back.

Opinion
Securing the backbone of our nation: critical infrastructure
Collaboration can minimize the risk of cyberattacks on U.S. critical infrastructure.

Future of fighting in cyberspace: What to expect at TechNet
The showroom floor will also be open to display the latest technology in cybersecurity from dozens of companies.

TikTok accuses secretive federal agency of ‘political demagoguery’
Internal documents provide details about negotiations between TikTok and the Committee on Foreign Investment in the United States in 2021 and 2022.

Opinion
The best way to counter bad artificial intelligence is using good AI
iI’s critical that policymakers avoid focusing too narrowly on catastrophic risk and inadvertently hamstring the creation of positive AI tools,.

Many software makers will miss Biden’s cybersecurity deadline today
A survey found that many software companies working with the federal government will not in compliance with an executive order.

Opinion
How to combat cyber threats and secure democracy in the digital age
There is an urgent need for robust cybersecurity and international cooperation to safeguard the very foundation of democracies: free and fair elections.
