Gaining an Edge With Digital Twins

BMC Software’s Bill Corrigan examines real-world use cases for digital twins, their benefits, and keys to successful implementation within the Federal space. […]

Transforming Government with an AI-Enabled Digital Workforce

Empower AI’s Paul Dillahay discusses how an AI-empowered digital workforce can create efficiencies and reduce the burnout felt by many government employees today. […]

Zero Trust: Promising Progress

Maximus’ Kynan Carver shares how zero trust is strengthening cybersecurity in on-premises and cloud environments, examples of zero trust progress, and what leaders are learning. […]

Bolster AI Innovation

Federal organizations need a workforce that is prepared to innovate with AI. Dell Technologies’ Michael Shepherd discusses the expertise, competencies, and tools that agencies need today – and in the future. […]

Taking IT to the Edge

The possibilities created by edge computing range to near space and beyond, but Red Hat’s John Dvorak, an emerging tech expert, says the building blocks of successful edge deployments are decidedly down-to-earth. […]

Shift Left & Right for Web App Security

Two in five breaches originate in a web app. No one is immune, especially as organizations of all sizes build custom apps. Invicti’s Laura Paine tells why shifting security left – and right – is essential to shoring up web security. […]

Cyber Central: Defenders Unite – The Final Word with Matthew Cornelius

Matthew Cornelius, Senate Homeland Security, shares insights about legislative efforts to reform FISMA. […]

Cybersecurity Is a Team Sport

Fortinet’s Jim Richberg, who spent more than 30 years driving innovation in Federal cyber intelligence, tells what it will take for government and industry to cover the other’s cyber blind side, and how a platform approach to cybersecurity can level the playing field against bad actors. […]

Rooting Out Ransomware

The threat of ransomware has government agencies and critical infrastructure providers on high alert. Recorded Future senior security analyst Allan Liska explains how network awareness, threat hunting, and automation help agencies fight back. […]

Identity Is the Core of Zero Trust

Richard Bird, an internationally recognized security expert with Ping Identity, explains why zero trust is dependent upon identity-centric security and tells how agencies can build upon existing security programs to get to zero trust. […]

Data Dilemmas in a Hybrid World

Technology Integration Groups’ Chad Martin offers sage advice for agencies grappling with data management and security challenges in hybrid cloud environments as they support remote and in-office workers. […]

Getting to Zero Trust

Palo Alto Networks’ Drew Epperson shares practical steps agencies can take to accelerate their move to zero trust security. Many are further along than they may think. […]

Killing It With Fire

Former state CIO and NASCIO President John Flynn interviews U.S. Digital Service alum Marianne Bellotti about her book, “Kill It With Fire,” which explores her unconventional approach to IT modernization. […]

TIC-ing Toward Zero Trust

CISA’s Sean Connelly shares the latest on TIC 3.0 and what’s next. […]

Costs Down, Capability Up

Dell Technologies’ Steve Harris examines agency efforts to erase technical debt – bringing about cost savings and improving mission delivery. […]

Big Plans at GSA FAS

New GSA FAS Commissioner Sonny Hashmi dishes about his priorities, from emerging tech to shared services. […]

Labor’s Secret FITARA Sauce

Labor CIO Gundeep Ahluwalia recounts how the department moved from C- to B- on the FITARA Scorecard. […]

What the TMF?

Rep. Gerry Connolly talks about the impact of the TMF funding decision. […]