Ideas
Uncovering the next wave of COVID-19 relief fraud through AI
COMMENTARY | Many agencies are increasingly relying on AI to uncover fraudulent activities, and the emerging technology could hold the key to help recoup billions of dollars siphoned off from the federal government in pandemic relief scams.
Modernizing secure code for the public sector
COMMENTARY | Refactoring legacy applications into modern programming languages yields not only memory-safe applications but typically produces smaller code bases, notably faster runtimes and increased scalability.
Federal agencies need to rethink culture in the fight against ransomware
COMMENTARY | Focusing efforts on risk management isn't about checking boxes – it's about building and changing agency culture.
Why SD-WAN is the future of government networks
COMMENTARY | The revolution in IT workloads requires flexible, adaptable networking solutions.
The case for making Direct File permanent
COMMENTARY | The Direct File pilot was a landmark event for the tax system and a victory for the civic technology movement. Now its time to make the program available to all taxpayers on a permanent basis.
4 ways generative AI will improve the federal government
COMMENTARY | Exciting advancements are ahead for the federal government by tapping generative AI, from streamlined operations to improved national security
The long tail of modernization
Why CX is an ongoing journey and not a destination.
How enforceable are software licenses?
COMMENTARY | An ongoing federal court case suggests the ubiquitous practice of "pass-through" licensing for software sold by resellers may not have a solid legal foundation.
How to fix the military’s software SNAFU
COMMENTARY | Too many of its apps are built on code riddled with vulnerabilities—and distributed by the Pentagon itself.
Why plugging leaks sometimes means protecting leakers
COMMENTARY | Congress needs to establish a form of amnesty that, where appropriate, provides an exit ramp for individuals who have unwittingly violated the terms of a security clearance and wish to come clean.
What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructure
COMMENTARY | Volt Typhoon has compromised thousands of devices around the world since it was publicly identified by security analysts at Microsoft in May 2023.
Pump the brakes: National security concerns surround connected cars
Commentary | There is an established pattern of abuse that demonstrates the Chinese Communist Party is willing and able to conduct espionage by exerting its influence on emerging technology.
Generative AI could leave users holding the bag for copyright violations
COMMENTARY | The popularity of these tools poses questions about intellectual property and copyright protection.
Building fairness into AI is crucial – and hard to get right
The pursuit of fairness in AI is not merely an ethical imperative but a requirement in order to foster trust, inclusivity and the responsible advancement of technology.
Featured eBooks