Chief information security officers oversee a cybersecurity workforce that deals with everything from foreign hackers to disgruntled insiders.
Budget uncertainty is running higher than ever. One technique lots of agencies use near the end of a fiscal year is reverse auctions.
The budget and the looming debt ceiling top Congress’ to-do list, but will members get bogged down with items like the population of Statuary Hall?
Federal News Radio presents a daily update of important moments in the history of the U.S. government.
Photos of the amazing, moving, important and amusing things happening in the federal community.
The federal government’s opportunity to change the way healthcare is delivered and consumed is immense.
What are the U.S. Army Reserve’s strategic priorities? What are the essential components of force readiness? How does the US Army Reserve support civil authorities? Join host Michael Keegan as he explores these questions and more with Lieutenant General Charles Luckey, Chief of Army Reserve & Commanding General U.S. Army Reserve Command.
In Defense terms, operating military bands doesn’t take a major outlay of money or personnel. But they can be a visible sign of both military pride and waste.
The next wave in national security superiority will come from something that’s been talked about for decades but is only now coming into its own —artificial intelligence.
Lured by Maryland Gov. Larry Hogan, the Baltimore Cyber Range has helped the city become a center for cybersecurity training.
Bringing federal agencies together to save money by sharing administrative services, that’s a lot like herding cats.
The Homeland Security Department’s Science and Technology Directorate is working on technologies to enable earlier flood warnings than is now possible.
The Trump administration is considering closing the State Department’s Office of Global Criminal Justice.
The Forest Service uses planes in wildfire suppression. The specs for one such plane landed the agency in the thicket of a protest.
Achieving a culture of secure dev ops doesn’t happen overnight, but it is possible when the leadership of an organization makes the brave, conscious decision to lead their organizations on a journey to examine processes and find the right platform.