The United States Air Force (USAF) on August 17 named Jay Bonci – a private sector cybersecurity veteran – as the service branch’s next chief technology officer (CTO), according to a post by Bonci. […]
The shift to remote work forced by the coronavirus pandemic has helped the Army’s Combat Capabilities Development Command (CCDC) – a component of Army Futures Command – identify security gaps, and work to improve IT security for offsite personnel, said Col. Gregory Smith, Military Deputy to the Director of the CCDC, at an AFFIRM webinar Dec. 16. […]
While many – if not most – Federal agencies are taking at least preliminary steps towards embracing advanced technologies like artificial intelligence (AI) and machine learning (ML), they are moving with a degree of justifiable caution when it comes to relying on those technologies as part of their cybersecurity defenses, government tech officials said today at an event presented by Fortinet. […]
While few can pronounce the Air Force CTO’s name – zero can spell it – which leads us in nicely to Frank Konieczny’s presentation on Zero Trust at Akamai’s event on Tuesday, April 30, “Zero Trust: Moving Beyond Perimeter Security.” […]
As the nation moves more and more online, Federal agencies are following suit to move more of their civilian interactions to an online or mobile setting. […]
Disruptive technologies such as artificial intelligence (AI) and the Internet of Things (IoT) can help Federal agencies better utilize their data to improve processes, public and private sector technology officials said during a FedInsider webinar on July 25. […]
The U.S. Air Force is talking to Congress about starting a multiyear, replenishable fund for cloud computing, according to Frank Konieczny, the chief technology officer of the Office of Information Dominance and chief information officer of the Office of the Secretary at the U.S. Air Force. […]
In order to ensure the security of IT devices while also reducing the proliferation of “shadow IT” in the government, agencies must work to create “win-win” compromises with device users, according to panelists at Dell EMC World. […]