Insights

Securing the Operational Edge: Addressing API Risk in the Age of Generative AI

<p></p> <p>For the Department of Defense (DoD), modern mission execution depends on fast, secure, and interconnected systems. APIs have become the backbone of digital interoperability across programs of record, platforms, and cloud environments. Yet as API usage surges&mdash;especially<br /> alongside generative AI (GenAI) integration&mdash;so do attack surfaces and operational vulnerabilities.</p> <p>This white paper, developed by RavenTek and Akamai, explores insights from DoD cybersecurity leaders and offers a strategy to secure APIs as a critical component of mission assurance.</p>

Countdown to zero trust: How defense agencies can tackle the 2027 mandate

<p>WITH THE DEPARTMENT OF DEFENSE&rsquo;S SEPT. 30, 2027, zero trust deadline on the horizon, defense agencies have just two years to revolutionize their approach to cybersecurity. While this may seem like a significant runway, it&rsquo;s important for agencies to begin thinking seriously about modernizing systems now, especially because implementing zero trust is about more than just updating an agency&rsquo;s tech stack &mdash; it&rsquo;s about fundamentally changing approaches to securing data, systems and operations across all environments.</p> <p>So, what do defense organizations need to think about as they look to build the foundations of zero trust into their IT policies and infrastructures? In a recent event sponsored by Maximus, experts from across government and industry sat down with GovExec TV Executive Producer George Jackson to discuss the foundations for cybersecurity overhauls and ways defense agencies can begin gathering the essential elements they need for zero trust, as well as potential hurdles along the way.</p>

A buyer’s guide to AI in government

<p></p> <p>Mission-critical decisions leave no room for guesswork. Secure, scalable AI built for the complexity of federal operations keeps missions on track.</p> <p></p> <p>The AI buyer&rsquo;s guide for federal decision-makers offers a practical framework for evaluating vendors, aligning use cases with mission goals, and scaling AI responsibly&mdash;without sacrificing oversight or compliance.</p> <p></p>

Empowering the public sector via secure data management solutions and storage modernization

<p>Public sector organizations are wondering if a federally mandated &ldquo;Cloud Smart&rdquo; strategy can be achieved without increasing risk or exploding operational budgets. Yes, the agility and elasticity of the cloud are appealing. But inconsistent data management and standards&mdash;plus data silos and technological complexity&mdash;make high speed cloud journeys extremely risky when public trust is on the line.</p> <p>There&#39;s a solution. Learn how AWS and NetApp teamed up after a decade of joint innovation to provide private enterprises and government entities with a trusted way to manage, move, and protect sensitive data and assets. Amazon FSx for NetApp ONTAP unites the best of two industry leaders, bringing simplicity and high performance to government cloud migration.</p>

Modernizing healthcare services through digital solutions

<p>The Defense Health Agency (DHA) supports over nine million Service Members and Military Health System beneficiaries, with high-quality, impactful and connected care.&nbsp;Digital platforms are rapidly shaping beneficiary expectations for their care experience. Among America&rsquo;s Service Member population, there is increasing demand for access to the Military Health System (MHS) via self-service portals and digital options, as active duty, reserve and retired U.S. Military personnel, along with their dependents, seek more convenient solutions.</p> <p>While digital solutions won&rsquo;t replace face-to-face interactions anytime soon, these solutions help make it easier for recipients to navigate the health system and connect to different information and modalities of care.</p>

Building a unified federal workplace at mission speed and scale

<p>Federal agencies are working to modernize systems, improve collaboration and deliver on their missions more efficiently &mdash;&nbsp;all while meeting strict security and compliance standards. This article explores how a unified, cloud-based approach to project management and service delivery helps eliminate silos, reduce administrative overhead and support long-term transformation. Learn how federal teams can streamline work, enhance visibility and embrace innovation at speed and scale.</p>

Identity as the new perimeter: Reimagining access in government

<p>The 2025 Government Identity Summit&nbsp;brought together leaders from the DoD, Civilian&nbsp;Agencies, Intelligence Community, and industry partners to formulate strategies against emerging digital identity threats.&nbsp;This after-action report summarizes key findings and Courses of Action (COAs) for enhancing user access, implementing a Zero Trust Architecture, and operationalizing next-generation Identity, Credential, and Access Management (ICAM) solutions.&nbsp;Effective identity governance is mission-critical for ensuring resilience and operational effectiveness.&nbsp;Explore these actionable ideas to support your agency&rsquo;s mission in a rapidly changing digital landscape.</p>

Building trust at the speed of mission: Why identity is the new frontline in DoD cybersecurity

As threats and priorities evolve, modern identity solutions enable secure, scalable defense operations.

State of Security 2025: The Stronger, Smarter SOC of the Future

<p>In 2025, security teams are breaking free from inefficiencies &mdash; eliminating tedious busywork, overcoming alert overload, and closing critical data gaps &mdash; to build a smarter, more resilient SOC of the future.</p> <p>Based on research with over 2,000 security professionals, our report uncovers the most impactful strategies for evolving the SOC.</p> <ul> <li>46% report spending more time maintaining tools than defending their organization.</li> <li>59% say they&rsquo;ve moderately or significantly boosted SOC efficiency with AI.</li> <li>74% rate detection engineering as the most important future skill for the SOC.</li> <li>63% want to frequently or always use detection as code in the future.</li> <li>59% say adopting a unified platform has sped up incident response.</li> </ul> <p>Download the&nbsp;<b>State of Security 2025</b>&nbsp;and learn how to transform your SOC from overwhelmed to optimized.</p>

Future of Cybersecurity

<p> <style type="text/css"><!--br {mso-data-placement:same-cell;}--> </style> A look at the latest cybersecurity news and technology, from the Pentagon to the battlefield.</p>

The State of Government’s IT Cloud Infrastructure

<p>As the federal government continues to adopt and reviews their cloud infrastructure, federal decision-makers face new challenges in overcoming inefficiencies and security concerns. Is the federal government able to achieve its goals with their current cloud technology? How are organizations determining success in cloud adoption? In March and April of 2025, GovExec&rsquo;s Insights and Research Group worked with Broadcom to survey 100 federal government decision-makers to answer these questions and more.</p>

The State of Government's IT Cloud Infrastructure

Vulnerabilities and threats posed to IT infrastructure in government

The path to effective AI in the public sector starts with content management

How AI-powered content management can enhance government efficiency and citizen experience

How your agency can improve efficiency with intelligent, open source content management solutions

<p>Government agencies face growing challenges managing vast, unstructured data across outdated systems. What agencies need are modern content management systems that can equip them with the tools to quickly and effectively structure and identify their information. Learn how modern tools can help agencies regain control of their content, reduce chaos, and support mission-critical efficiency.</p>

The Observability Pipeline Buyer's Guide

<p> <style type="text/css"><!--td {border: 1px solid #cccccc;}br {mso-data-placement:same-cell;}--> </style> Should you build your own observability pipeline?<br /> <br /> When looking for an observability pipeline, there are many things to consider before making a decision. Some will argue for open source solutions while others have solutions that are heavily tied to their existing vendors. While all solutions have their strengths and weaknesses, it&rsquo;s important to consider the short term and long term benefits of each deployment option.</p>

How the government can stay one step ahead of AI-powered cyberattacks

<p>Imagine a world where malicious actors have the tools at their disposal to execute cyberattacks in faster, more sophisticated, and more streamlined ways, leaving government organizations and constituent information even more vulnerable to attack. This is what artificial intelligence (AI) promises to do if agencies aren&rsquo;t equipped with the necessary tools to prevent the AI-based cyberattacks on the horizon.</p>

No content found