Agencies must prioritize implementing Backup as a Service more efficiently in order to realize the full data storage and access benefits. While many BaaS providers offer to securely back up agencies’ ...
The supply chain for information and communication technologies can be an access point for hackers. Compromised SolarWinds Orion network management software, for example, was sent to an estimated ...
The federal government’s ambitious plans to implement zero-trust security across federal agencies, while well-intentioned, will require substantially more funding and foundational technical work than ...
Twenty federal agencies failed to meet the Biden administration’s deadline for implementing the most advanced cyber event logging requirements across their systems, with most agencies failing to ...
The National Environmental Policy Act (“NEPA”) requires an in-depth evaluation of the environmental impacts of federal actions, including actions by the federal agency itself, through issuance of a ...
There have been numerous industry complaints – and a number of lawsuits – about the Centers for Medicare & Medicaid Services’ (CMS) rollout of the No Surprises Act (NSA). Nevertheless, CMS and the ...
Federal agencies are dependent on information systems to carry out operations. The risks to these systems are increasing as security threats evolve and become more sophisticated. To reduce the risk of ...
The new CEQ guidance modifies prior guidance issued on February 19, 2025, and contains a new directive: prioritizing efficiency and certainty over any other NEPA policy objective. The guidance ...
Four U.S. agencies — the departments of Homeland Security, Justice, Defense and State — are apparently still having trouble complying with some of the requirements of the Federal Information Security ...
Get the latest federal technology news delivered to your inbox. Twenty federal agencies failed to meet the Biden administration’s deadline for implementing the most advanced cyber event logging ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results