The Federal Data Strategy brought to the fore an issue that is critical to government technology missions – the urgent need to know what employees can do. Only by gaining accurate and timely knowledge of employee skill sets can Federal agencies fully accomplish their increasingly complex missions and better serve the public. In a recent interview with MeriTalk, Tony Holmes, public sector practice lead for solutions architects at Pluralsight, discusses how Federal organizations can gain this vital knowledge of employee skills in a workplace increasingly transformed by artificial intelligence (AI) and other emerging technologies. […]
As the U.S. government advances to a war-fighting posture that increasingly integrates emerging technologies, the Department of Defense (DoD) is modernizing computing infrastructure to support new capabilities. At the same time, virtualized, mission-critical applications must run uninterrupted. In a recent interview, Travis Steele, chief architect at Red Hat, discussed best practices for virtualization today, how virtualization and containers can coexist, and how a common platform for both creates a pathway to modernization. […]
The Federal government is facing challenges to its logistics missions, from growing threats to global disruptions that show little sign of letting up. Recently, new disruptions have threatened global supply chains, driven by world events including slowed supply chains at the crucial Panama Canal and Suez Canal. […]
Shortly after her induction into the 2024 class of Cyber Defenders, we were delighted to grab 20 minutes with Megan Kane, Risk Management Branch Chief at the Department of Homeland Security’s U.S. Citizenship and Immigration Services component, for a talk about the critical importance of risk management along with the hot-button challenges of supply chain risk management, the advent of AI in security, continuous monitoring, governance improvements, and zero trust implementation. […]
Following her induction into the 2024 class of Cyber Defenders, we were thrilled to catch up with Carolyn Duby – who is the Federal chief technology officer and cybersecurity GTM lead at Cloudera – for an in-depth talk about harnessing data for cybersecurity analytics, the enduring value of the Federal government’s migration to zero trust security, how to proceed safely with artificial intelligence technologies, and the urgency of getting ready for quantum computing. […]
The acceleration of artificial intelligence (AI) technologies has reached the tactical edge, where Department of Defense (DoD) leaders are utilizing generative AI (GenAI) and other AI applications to act on data generated where the mission is happening. […]
George Dilger II, who is the Federal regulatory compliance IPv6 SME at Dell Technologies and a new inductee into the Cyber Defenders class of 2024, gave us 20 minutes of his time to shine a powerful light on how high-profile government technology policies can sometimes end up reinforcing one another to improve security. […]
Fresh off his induction into the 2024 class of Cyber Defenders, we were delighted to sit down for a half hour with Gary Barlet – who is public sector chief technology officer at Illumio – for a wide ranging talk about government cybersecurity needs, the criticality of the current zero trust security transition, and the multiple facets of artificial intelligence (AI) technology in the hands of both adversaries and network defenders. […]
Early results from Federal agencies’ financial transformation initiatives have yielded benefits including improved citizen service and decision-making capabilities, but fewer than half of Federal IT and finance leaders believe their systems are very effective in critical areas such as financial planning, compliance, and data integrity, according to a recent MeriTalk survey conducted in partnership with KPMG. […]
Following his recent induction into the 2024 class of Cyber Defenders, we were happy to grab a few minutes with David Link, the founder and CEO of Reston, Va.-based ScienceLogic, for a conversation about the importance of data observability and protection in cybersecurity as the IT landscape continues to grow ever-more complicated. […]