News
Five years after the White House Office of Management and Budget shifted policy gears —from “Cloud First” to “Cloud Smart” — federal agencies have reached a new threshold in cloud adoption, with ...
Federal agencies plan to spend billions of dollars each year to support their IT and cybersecurity efforts, including transitioning IT resources to secure, cost-effective commercial cloud services.
Hackers exploited a major security flaw in widely used Microsoft server software to launch a global attack on government ...
While federal agencies plan to spend billions of dollars on IT and cybersecurity efforts—many on commercial cloud services—they also face several hurdles according to a Government ...
While federal agencies face hurdles to digital transformation and using technology to improve processes and the citizen experience, they are making steady progress. Modernizing legacy, monolithic ...
Government agencies are modernizing their IT systems and making upgrades to legacy systems at a rate like never before. This doesn’t come without its challenges — moving to the cloud will also require ...
A decade ago, federal agencies dipped their toes into cloud computing offerings, wondering what opportunities and challenges the emerging technology might offer. Today, agencies are looking to ...
Executive Order 14028, issued in May of 2021, recommends that to modernize federal government cybersecurity, agencies should prioritize resources for the adoption and use of cloud technologies.
The CSIS Commission on Federal Cloud Policy examined federal cloud computing. It produced a report which highlights the critical need for U.S. government agencies to adopt private sector best ...
The Federal Trade Commission has demanded information from Microsoft and interviewed competitors as the agency’s antitrust investigation heats up. The probe follows ProPublica reporting on how ...
CISA has issued this year's first binding operational directive (BOD 25-01), ordering federal civilian agencies to secure their Microsoft 365 cloud environments by implementing a list of required ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results