MeriTalk Staff

MeriTalk

ai-honors-awards

While consensus is mounting that there is no greater change agent set to reshape the government IT arena than the application of artificial intelligence (AI) technologies, it’s often much less clear who are the rising stars in government and industry that are leading the AI transformation. […]

Cyber-Defenders

Following his induction into the 2024 class of Cyber Defenders, we were delighted to catch up with Gregory Garrett, who is chief operating officer at government tech provider REI Systems, for his look at the promising future that artificial intelligence (AI) technologies can bring to improve cybersecurity, as well as the need to approach AI with a measure of caution for risks the technology can introduce. […]

cybersecurity

The Trusted Internet Connection (TIC) policy has evolved to meet the security demands of multi-cloud environments and mobile end users. However, many agencies need to fully capitalize on the potential of TIC 3.0 and modern Zero Trust and Secure Access Service Edge (SASE)-based security frameworks. […]

The Federal Data Strategy brought to the fore an issue that is critical to government technology missions – the urgent need to know what employees can do. Only by gaining accurate and timely knowledge of employee skill sets can Federal agencies fully accomplish their increasingly complex missions and better serve the public. In a recent interview with MeriTalk, Tony Holmes, public sector practice lead for solutions architects at Pluralsight, discusses how Federal organizations can gain this vital knowledge of employee skills in a workplace increasingly transformed by artificial intelligence (AI) and other emerging technologies. […]

DoD Pentagon Military

As the U.S. government advances to a war-fighting posture that increasingly integrates emerging technologies, the Department of Defense (DoD) is modernizing computing infrastructure to support new capabilities. At the same time, virtualized, mission-critical applications must run uninterrupted. In a recent interview, Travis Steele, chief architect at Red Hat, discussed best practices for virtualization today, how virtualization and containers can coexist, and how a common platform for both creates a pathway to modernization. […]

supply chain

The Federal government is facing challenges to its logistics missions, from growing threats to global disruptions that show little sign of letting up. Recently, new disruptions have threatened global supply chains, driven by world events including slowed supply chains at the crucial Panama Canal and Suez Canal. […]

Cyber-Defenders

Shortly after her induction into the 2024 class of Cyber Defenders, we were delighted to grab 20 minutes with Megan Kane, Risk Management Branch Chief at the Department of Homeland Security’s U.S. Citizenship and Immigration Services component, for a talk about the critical importance of risk management along with the hot-button challenges of supply chain risk management, the advent of AI in security, continuous monitoring, governance improvements, and zero trust implementation. […]

Cyber-Defenders

Following her induction into the 2024 class of Cyber Defenders, we were thrilled to catch up with Carolyn Duby – who is the Federal chief technology officer and cybersecurity GTM lead at Cloudera – for an in-depth talk about harnessing data for cybersecurity analytics, the enduring value of the Federal government’s migration to zero trust security, how to proceed safely with artificial intelligence technologies, and the urgency of getting ready for quantum computing. […]

The acceleration of artificial intelligence (AI) technologies has reached the tactical edge, where Department of Defense (DoD) leaders are utilizing generative AI (GenAI) and other AI applications to act on data generated where the mission is happening. […]

Cyber-Defenders

George Dilger II, who is the Federal regulatory compliance IPv6 SME at Dell Technologies and a new inductee into the Cyber Defenders class of 2024, gave us 20 minutes of his time to shine a powerful light on how high-profile government technology policies can sometimes end up reinforcing one another to improve security. […]

MeriTalk Staff
MeriTalk