Beat the Bots: GSA Seeks Input on Fighting Fake Comments
With campaigns of mass and fake comments plaguing public feedback mechanisms for regulatory agencies, GSA seeks public input on potential solutions.
With campaigns of mass and fake comments plaguing public feedback mechanisms for regulatory agencies, GSA seeks public input on potential solutions.
The updated Trusted Internet Connection (TIC) 3.0 policy keeps up with the modern needs that agencies have to connect to their digital working environments faster and more securely.
Since the last edition of the FITARA scorecard, DHS and NASA have remarkably risen from the bottom according to the public release on Wednesday.
As the season approaches for year-past reflections on progress and growth, the annual federal Chief Human Capital Officers (CHCO) Council public meeting forecasted a year ahead with room to grow in fostering a merit-based, nationally representative workforce.
Identity and access management (IAM) is not just about doing security to comply with government requirements. Instead, it’s a means to ensure the consistency and trustworthiness of government services, especially as digital options expand.
IT controls consist of the procedures and policies that help ensure that technologies are being used for their intended purposes in a reasonable manner.
The hope is the community will feed into a larger initiative, aimed at embedding AI professionals within agencies to help improve services to the public.
An integrated long-term data retention strategy is key to supporting effective decision-making about the workforce, budget, security and other areas.
This month, the Defense Logistics Agency (DLA) released a foundational data and analytics document that will direct data governance, acquisition strategies and the incorporation of emerging technologies for the military’s combat logistics branch.
Congress mandated the new commission to protect U.S. cybersecurity by learning from America’s Cold War strategy for the Soviet Union.