Ideas

Securing open source software is a team sport

COMMENTARY: Public-private partnerships offer a path to solving the persistent problem of open source software security.

VA acquisitions asks vendors to show their work

COMMENTARY: The principle of "do, don't say" could be catching hold at the Department of Veterans Affairs.

Cyber meets warfare in real time

COMMENTARY: Why Hezbollah's exploding pagers signal a dangerous new era for global businesses.

Organizing to meet the most urgent threats

COMMENTARY: The government’s recognition of the need for asset visibility has kickstarted the process by which agencies have begun to focus on contextualizing assets in their environments, prioritizing threats and then taking action to stay protected.

The migration challenge

COMMENTARY: Upgrading legacy systems to modern infrastructure is critical, but migrating workloads and applications introduces potential vulnerabilities that must be addressed.

How FedRAMP is evolving to meet the challenges of the cloud computing market

Updates to federal cloud security policy are laying the foundation for a more secure and resilient cloud ecosystem.

Why human-centered design is the key to better CX

COMMENTARY: Better, more thoughtful technology can spark innovation in delivery of citizen services.

Why the IRS needs a new accountability program

COMMENTARY: The tax agency should borrow from the Social Security Administration's SecurityStat effort to measure performance and promote internal transparency.

Lessons from the CrowdStrike outage

COMMENTARY: Agencies can mitigate impacts of future outages by putting IT risks front and center and by understanding the incident response requirements of their vendors.

How biometrics can improve the security and efficiency of air travel

COMMENTARY: While we must ensure that biometric technology protects privacy and improves accuracy, abandoning this technology altogether would threaten our national security and set aviation screening back decades.

Strengthening public-private collaboration in the post-Chevron era

Congress will need to foster a deeper understanding of complex, bleeding-edge technology issues to craft effective regulations that will endure scrutiny.

How to be data-ready for AI adoption

COMMENTARY: Outcomes are only as reliable as the data supporting generative AI tools.

China leans into using AI − even as the US leads in developing it

The Chinese government has made extensive use of existing AI technologies, including for surveillance.

How fusion centers protect the country

COMMENTARY: The centers provide the technology and tools needed to identify threats that lie beyond the walls of the organization.

The coming cyber reckoning for federal contractors

Contractors face a 90-day deadline to prove their cybersecurity compliance as awards for the OASIS+ vehicle start to fall and that is a precursor to broader industry-wide requirements, DTS CEO Edward Tuorinsky writes.

Following the federal cybersecurity money trail

COMMENTARY: Cybersecurity is crucial to everything from massive critical infrastructure projects to the safe operation of small businesses and increasingly to the private life of every American.