Ideas
Resilience by design
COMMENTARY | How federal agencies can achieve cyber resilience via a data-centric security approach.
Ideas
Uncovering the next wave of COVID-19 relief fraud through AI
COMMENTARY | Many agencies are increasingly relying on AI to uncover fraudulent activities, and the emerging technology could hold the key to help recoup billions of dollars siphoned off from the federal government in pandemic relief scams.
Ideas
Modernizing secure code for the public sector
COMMENTARY | Refactoring legacy applications into modern programming languages yields not only memory-safe applications but typically produces smaller code bases, notably faster runtimes and increased scalability.
Ideas
Federal agencies need to rethink culture in the fight against ransomware
COMMENTARY | Focusing efforts on risk management isn't about checking boxes – it's about building and changing agency culture.
Ideas
Why SD-WAN is the future of government networks
COMMENTARY | The revolution in IT workloads requires flexible, adaptable networking solutions.
Ideas
The case for making Direct File permanent
COMMENTARY | The Direct File pilot was a landmark event for the tax system and a victory for the civic technology movement. Now its time to make the program available to all taxpayers on a permanent basis.
Ideas
4 ways generative AI will improve the federal government
COMMENTARY | Exciting advancements are ahead for the federal government by tapping generative AI, from streamlined operations to improved national security
Ideas
How enforceable are software licenses?
COMMENTARY | An ongoing federal court case suggests the ubiquitous practice of "pass-through" licensing for software sold by resellers may not have a solid legal foundation.
Ideas
How to fix the military’s software SNAFU
COMMENTARY | Too many of its apps are built on code riddled with vulnerabilities—and distributed by the Pentagon itself.
Ideas
Why plugging leaks sometimes means protecting leakers
COMMENTARY | Congress needs to establish a form of amnesty that, where appropriate, provides an exit ramp for individuals who have unwittingly violated the terms of a security clearance and wish to come clean.
Ideas
What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructure
COMMENTARY | Volt Typhoon has compromised thousands of devices around the world since it was publicly identified by security analysts at Microsoft in May 2023.
Ideas
Pump the brakes: National security concerns surround connected cars
Commentary | There is an established pattern of abuse that demonstrates the Chinese Communist Party is willing and able to conduct espionage by exerting its influence on emerging technology.
Ideas
Generative AI could leave users holding the bag for copyright violations
COMMENTARY | The popularity of these tools poses questions about intellectual property and copyright protection.
Ideas
Building fairness into AI is crucial – and hard to get right
The pursuit of fairness in AI is not merely an ethical imperative but a requirement in order to foster trust, inclusivity and the responsible advancement of technology.
Ideas
Navigating the cyber frontier 1 year into the National Cybersecurity Strategy
COMMENTARY | As outlined in the strategy, aggressively modernizing legacy systems is critical to manage risk across government networks.
Ideas
Embedding AI in tech modernization plans
COMMENTARY | Opportunities exist to accelerate AI adoption across government and use tools like the FITARA Scorecard to ensure effective implementation.
Ideas
Why AI localization makes sense
COMMENTARY | Localization supports faster response times and more intelligent interactions between users and systems.
Ideas
Checking in on digital government in China
COMMENTARY | Steve Kelman writes that an online system for registering complaints and comments about government services has its roots in China's imperial past.
Ideas
The new March Madness
COMMENTARY | The 2024 budget has yet to pass halfway through the fiscal year.
Almost There!
Help us tailor content specifically for you: