
DoD’s Software Factories Come of Age
In recent years, the Department of Defense has launched an aggressive software modernization push—one built on the pillars of cloud adoption, cultural change, and agile development. At the center of this transformation is George Lamb, Director of Cloud and Software Modernization in the Office of the DoD CIO who joined Fed Gov Today at TechNet Cyber to discuss how the department is moving from pilot projects to enterprise-scale execution.

Driving Zero Trust Through Interoperability and Smarter Procurement
Sabrina Lea, Federal Sales Director at Okta, offers a software vendor’s view of zero trust implementation across government. Rather than selecting tools based on checklists, she encourages agencies to prioritize how security tools communicate with one another.

The Air Force’s Bold IT Shift
Outgoing Air Force CIO Venice Goodwine shares the sweeping IT changes she has led since taking office in August 2023. Chief among them is the implementation of zero trust across the Department of the Air Force, in alignment with DoD CIO mandates.

How Industry is Shaping the Future of Federal Cybersecurity
As the threat landscape grows more complex, government and military agencies are under pressure to move from reactive defense postures to proactive, intelligent cyber strategies. Across the board, industry leaders working closely with the public sector are seeing a decisive shift.
Connecting Partners to Cyber Success
Alex Whitworth, Director of Sales at Carahsoft, outlines how Carahsoft empowers government agencies by offering access to a wide range of technology providers and simplifying the acquisition process.
Looking Over the Horizon with DISA
Steve Wallace, Chief Technology Officer at the Defense Information Systems Agency (DISA), shares how DISA is preparing for the future with a focus on practical AI use cases, network detect and respond (NDR) tools, and the implementation of quantum-resistant cryptography.
Accelerating Modernization for the Mission
James Hanson, Acceleration Team Manager at Adobe, discusses how digital modernization aligns with the DOD’s evolving priorities, including acquisition reform and operational efficiency.
Operationalizing Zero Trust at Scale
David Voelker, Zero Trust Architecture Lead for the Navy, emphasizes the importance of micro-segmentation and user/entity behavioral analytics in Zero Trust implementation.
Securing the Quantum Future
Aaron Faulkner, Co-Founder of TYCHON, outlines the dual challenge and opportunity of quantum computing in cybersecurity. While quantum technology offers new computational power, it also poses a significant threat to legacy encryption standards like RSA.
Building Cyber into the Corps
Jeff Hurley, Acting Director of IIC4 at the U.S. Marine Corps, explains how the Corps is modernizing its network from "flagpole to fighting hole."
Cyber Resilience Starts with Visibility
Tom Kennedy, Vice President at Axonius Federal Systems, stresses that visibility is the foundation of any cyber resilience strategy. He explains how asset inventory is often the first step agencies take to defend against threats.
Unified Zero Trust at the Edge
Kelly Ahuja, CEO of Versa Networks, explains why Zero Trust is not just a set of components but a dynamic framework that requires consistent enforcement across networks.
Defining Cyber Survivability
Steve Pitcher, Senior Cyber Survivability Analyst at the Joint Staff, redefines cybersecurity as a matter of mission performance rather than just compliance.
AI as a Cyber Co-Pilot
Mac Gupta, Senior Director of Marketing at Rocket Software, describes how artificial intelligence serves as a "co-pilot" in cybersecurity operations—augmenting decision-making, not replacing it.

Augmenting Cyber Teams with AI
Gaine Nazareth, Director of Solution Consulting at ServiceNow, explains how artificial intelligence should be treated as a strategic partner in cyber operations—not just a tool.

Identity as a Cyber Strategy
Ivan Anderson, Senior Solutions Consultant at Socure, highlights why identity is still one of the biggest blind spots in federal cybersecurity.
About Our Company
Best Publishing Platform
In a professional context it often happens that private or corporate clients corder a publication to be made and presented with the actual content still not being ready. Think of a news blog that’s filled with content hourly on the day of going live. However, reviewers tend to be distracted by comprehensible content, say, a random text copied from a newspaper or the internet. The are likely to focus on the text, disregarding the layout and its elements.
Our Growing News Network
Cicero famously orated against his political opponent Lucius Sergius Catilina. Occasionally the first Oration against Catiline is taken for type specimens.