Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home Home MENU
Log in
Mobile menu
  • Topics
  • Agencies
  • Features
  • Tips & Tactics
  • Video
  • CapITal
  • Events
  • More
  • Search
Main menu
  • Topics
  • Agencies
  • Features
  • Tips & Tactics
  • Video
  • CapITal
  • Events
  • More
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Artificial Intelligence
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

What Is Biometric Authentication?
Security
How the Government Uses Biometric Authentication Technology
What Is Disaster Recovery as a Service (DRaaS)?
Cloud
What Is Disaster Recovery as a Service, and How Can It Help Feds?
Doctor reviewing images
Security
FDA Tightens Its Medical Device Cybersecurity Guidance
  • About Insider
  • Feds in the Field
  • News
  • Reviews
  • Telehealth
  • The Byte
  • Voices
2025 influencers
24 Federal IT Influencers Worth Following in 2025
Dec 01 2025

These government leaders are charting the course for agencies’ IT modernizations, cybersecurity and AI futures in the era of government efficiency.

Robert Costello, CIO, CISA

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Tech Tips

Coworkers collaborating

Digital Workspace

3 Ways Federal IT Leaders Can Maximize Existing Tech

Officials must optimize their systems for employees returning to the office full time, now and into the future.

Close

New Research from CDW on Workplace Friction

Learn how IT leaders are working to build a frictionless enterprise.

Click Here to Read the Report
Password-free security

Security

Take These 4 Steps to Create Password-Free Authentication
Worker using a smartphone

Networking

4 Ways That Federal Workers Can Protect Their Location Data
electronic signatures

Security

4 Tips to Ensure the Security of Digital Signatures at Your Agency
SNMP networking

Networking

How to Coordinate Multiple Devices Across a Network with SNMP
Azure Cloud Resources

Cloud

Use These 3 Steps to Deploy Resources Inside the Azure Cloud
Multifactor authentication

Security

How to Install Multifactor Authentication on Microsoft Office 365
Docker containers

Software

Get Started on Using Containers with These Docker Tips
Azure Virtual Machines

Data Center

4 Tips to Quickly Restore an Azure Virtual Machine
Look for These 4 Opportunities to Save During IT Improvements

Cloud

Look for These 4 Chances to Save During IT Improvements
SD-WAN

Networking

4 Factors to Consider Before Installing SD-WAN
  • Load More Stories

Advertisement

Trending Now

What Is Biometric Authentication?
How the Government Uses Biometric Authentication Technology
What Is Disaster Recovery as a Service (DRaaS)?
What Is Disaster Recovery as a Service, and How Can It Help Feds?
Doctor reviewing images
FDA Tightens Its Medical Device Cybersecurity Guidance
Person using headset at computer
DOD Is Finally Leaning Into CMMC 2.0 Requirements for CUI
AFCEA

Event

West

Person using computer

Security

Threat Exposure Management Establishes a Risk-Driven Approach for Federal Agencies

FedTech

Technology Solutions That Drive Business

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Research Everything IT

Tap into practical IT advice from CDW experts

Visit the Research Hub
Get FedTech
in your Inbox
Browse Email
Archives
newsletter screenshot
Subscribe to
FedTech Magazine
Browse Magazine
Archives
Robert Costello, CIO, CISA
  • FedTech:

  • CDW:

Back To Top

Copyright © 2026 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information