Will Roper, the U.S. Air Force’s acquisition head and a 2020 Wash100 Award recipient, said during the Air Force Digital Campaign’s first virtual industry event that digital engineering can significantly drive the development
MoreThe Government Accountability Office (GAO) is recommending for the Department of State to involve more agencies in the development of a new bureau focused on emerging technologies and cybersecurity. The State Department
MoreThe Office of Personnel Management (OPM) has created a cloud practice to meet the agency’s need to make informed telework decisions during the COVID-19 pandemic. Prior to the cloud practice, OPM facilities
MorePerspecta has gifted Home of the Brave campaign to Soldiers' Angels, a national nonprofit organization, to expand the scope of the campaign nationwide, Perspecta reported on Thursday. Home of the Brave has
MoreThe National Security Commission on Artificial Intelligence has asked small and medium sized companies for feedback on how the government should work with the private sector to advance commercial AI innovation. A request for
MoreFederal officials said they think lawmakers will someday incorporate the Technology Business Management (TBM) framework, a data-driven tool that could help show the impact of information technology investments on agencies’ missions, into
MoreGen. John Hyten, vice chairman of the Joint Chiefs of Staff and a two-time Wash100 Award recipient, said he plans to introduce new joint requirements for managing data by the end of the year.
MoreChi Kang, deputy director for operations at the National Oceanic and Atmospheric Administration’s (NOAA) cybersecurity division, has said that segmentation and software-defined, wide-area networking (SD-WAN) can support the implementation of zero-trust concepts.
MoreThe Test Resource Management Center modernized a high-speed test track at Holloman Air Force Base as part of efforts to enhance the track's efficiency. TRMC built an on-site laboratory to explore how
MoreThe National Security Agency (NSA) has published a review of mechanisms to consider when applying multifactor authentication (MFA). The guidance, titled “Cybersecurity Information Sheet Selecting and Safely Using Multifactor Authentication Solutions,” tackles
More