• Defending the government enterprise

    To ensure enterprise resilience, agencies must deploy a holistic architecture that provides a zero-trust solution, verifying all users and devices and offering enterprise-scale data protection.

  • AI streamlines acoustic ID of beluga whales

    Scientists at the National Oceanic and Atmospheric Administration who study endangered beluga whales in Alaska’s Cook Inlet used artificial intelligence to reduce the time they spend on analysis by 93%.

  • Autonomous vehicles deliver COVID-19 tests to lab

    Traveling across the Mayo Clinic’s Florida campus, the unmanned AVs ferry tests from a drive-thru clinic to a processing lab.

  • Fighting jet-lag, traveler’s diarrhea with implantable pharmacies

    DARPA’s Advanced Acclimation and Protection Tool for Environmental Readiness program aims to develop implantable or ingestible bioelectronic carriers that will be able to manufacture, store and deliver therapeutic drugs to warfighters.

  • Tips for keeping virtual meetings secure

    IT leaders are warning users that the pandemic’s disruption of normal work processes has created wide avenues for malicious third parties to access and exploit government systems.

  • What’s your cloud safety plan?

    Agencies entering into an agreement with a cloud provider must develop an exit strategy before signing on the dotted line so they don’t get trapped.

  • NY assembling COVID-10 tech SWAT teams

    Teams will assist in the state’s coronavirus response for three-month service deployments and address issues in technology, operations, analytics and communications.

  • Sensing atmospheric energy to identify Earth-bound disturbances

    The Defense Advanced Research Projects Agency’s AtmoSense program aims to better understand how energy travels from the ground to the ionosphere. The hope is that the atmosphere could be used as a sensor to identify natural disturbances.

  • Federal outlook: ICAM access and automation

    Identity, credential and access management solutions that are operations- and automation-ready, easy to deploy, transparent and frictionless will help agencies deploy secure access for their users and contractors.

  • DHS cyber chief takes on ransomware

    While Cybersecurity and Infrastructure Security Agency has not aggressively addressed ransomware threats, the agency is reaching out to local governments, businesses and critical infrastructure managers about how to prepare and respond.