This Special Publication details our research exploring cybersecurity role-based training for those who for individuals who are assigned management, operational, and technical roles having security and privacy responsibilities. Most United…
Learn MoreThis publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles, concepts, activities, and tasks can be effectively applied within systems engineering…
Learn MoreWith higher speeds, superior reliability, and endpoint to endpoint device connectivity, 5G has the potential to transform how the Government operates in the future. Although not fully deployed, 5G is…
Learn MoreThe federal government directly and indirectly supports scientific and technological advancement by funding and enforcing policies. Federal S&T funding has resulted in new technologies ranging from jet planes to communications…
Learn MoreThis report provides an overview of the position that the United States holds in terms of global research and development (R&D) in the fields of science and technology. It illustrates…
Learn MoreWhat is attack surface? Depends on who you ask. Considering the answer includes “ANY exposure point to a hostile entity” – there is certainly a LOT of surface to protect!…
Learn MoreThe role of a Chief Experience Officer (CXO) is a relatively new one, especially within the Federal government. CXOs help promote a customer centric mindset throughout business processes in many…
Learn MoreMany public sector organizations are struggling with multicloud complexity as they adopt cloud-based technologies at enterprise scale. Organizations are growing their way into multiple commercial service provider clouds, on-premises clouds,…
Learn MoreToday’s multicloud environments are highly complex and consist of infrastructure spread across owned data centers, edge deployments, and/or leased from public cloud providers. Managing this complexity from Day 2 onward…
Learn MoreIn 2020, a House subcommittee concluded a 16-month investigation into the market power of four of the largest platform operators: Facebook, Google, Amazon, and Apple. The inquiry resulted in a…
Learn MoreThis paper describes the progress scientists have made in replacing critical elements in various components of lithium-ion batteries to improve their performance and safety while using more sustainable, widely available,…
Learn MoreDue to growing cybersecurity infrastructure and increasingly sophisticated cybersecurity threats, continuous monitoring of information security systems through automation is the best way to accurately assess vulnerability across a complex threat…
Learn MoreIn the next three to five years, according to data from the White House, almost 30% of current senior executive federal service workers will be eligible for retirement. The pandemic…
Learn MoreDrone technology has greatly impacted day-to-day mission delivery at many agencies. Once found only on the battlefield, drones are now used for various non-military applications across the Federal Government, with…
Learn MoreRead highlights from a discussion among topic experts across Federal agencies on how emerging technologies have transformed government, and the hurdles agencies must overcome to achieve modernization. While the term…
Learn More