Commentary

NIST

Navigating the new landscape: Understanding and implementing NIST CSF 2.0

While NIST CSF 2.0 offers valuable guidance for organizations, regardless of size or industry, certain sectors stand to gain immense value from its adoption.

Read more
Getty Images/iStockphoto/kishore kumarartificial intelligence, AI

The secret sauce to winning more government contracts

Read more
computer user exploring AI uses

Federal agencies beware: AI is not all it’s cracked up to be – at least not yet

Read more
Getty Images/iStockphoto/NicoElNinoTelecommunication network above city, wireless mobile internet technology for smart grid or 5G LTE data connection, concept about IoT, global business, fintech, blockchain

Multimodal geospatial data – Shrinking time from acquisition to actionable insights

Read more
Getty Images/iStockphoto/KanawatTH

Navigating the complexities of zero trust in the modern cybersecurity landscape

The pivotal role of cloud observability is now at the forefront, serving as the key to unlocking the full potential of the zero trust extended framework.

Read more
Getty Images/iStockphoto/NicoElNinozero trust, Cybersecurity IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB

It’s more crucial than ever for agencies to mitigate insider risk

Transitional periods — even those spurred by a desire for greater cybersecurity — tend to increase insider risk.

Read more
pilots, FAA, airline

Another line of defense: Pilots are struggling and continuous evaluation technologies can help

Many pilots are hiding their mental health problems from the Federal Aviation Administration, fearing that they’ll lose their certifications and their jobs.

Read more