Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home Home MENU
Log in
Mobile menu
  • Topics
  • Agencies
  • Features
  • Tips & Tactics
  • Video
  • CapITal
  • Events
  • More
  • Search
Main menu
  • Topics
  • Agencies
  • Features
  • Tips & Tactics
  • Video
  • CapITal
  • Events
  • More
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Artificial Intelligence
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

What Is Biometric Authentication?
Security
How the Government Uses Biometric Authentication Technology
What Is Disaster Recovery as a Service (DRaaS)?
Cloud
What Is Disaster Recovery as a Service, and How Can It Help Feds?
Doctor reviewing images
Security
FDA Tightens Its Medical Device Cybersecurity Guidance
  • About Insider
  • Feds in the Field
  • News
  • Reviews
  • Telehealth
  • The Byte
  • Voices
2025 influencers
24 Federal IT Influencers Worth Following in 2025
Dec 01 2025

These government leaders are charting the course for agencies’ IT modernizations, cybersecurity and AI futures in the era of government efficiency.

Robert Costello, CIO, CISA

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Tech Trends

FT_Q222_TechTrends_Hero

Security

Endpoint Detection and Response Helps Agencies See Potential Attacks More Clearly

Endpoint detection and response gives agencies a wider view into possible cyberattacks.

Close

New Research from CDW on Workplace Friction

Learn how IT leaders are working to build a frictionless enterprise.

Click Here to Read the Report
FITARA scores

Software

IRS Find High FITARA Scores Stem from Good Software License Inventories
The National Weather Service manages agency security with Microsoft Active Directory.

Security

Creative Ways to Authenticate Users Also Improve Cybersecurity
Murugiah Souppaya of NIST

Security

Whitelisting May Be the Future of System Security

Security

Why Identity as a Service Might Make Remembering Passwords a Thing of the Past

Software

Virtual Reality Helps FEMA, VA Bring Their Missions to Life

Data Center

Why Agencies Rely on Network Monitoring Tools More Than Ever

Security

New Authentication Tools May Have You Blink to Access Your Files

Mobility

FEMA, Census Bureau Plan to Go Mobile and Rationalize Their Device Portfolios

Cloud

Social Security Administration, HUD See Promise in Hybrid Cloud

Cloud

The Third Platform Presents Endless Possibilities
  • Load More Stories

Advertisement

Trending Now

What Is Biometric Authentication?
How the Government Uses Biometric Authentication Technology
What Is Disaster Recovery as a Service (DRaaS)?
What Is Disaster Recovery as a Service, and How Can It Help Feds?
Doctor reviewing images
FDA Tightens Its Medical Device Cybersecurity Guidance
Person using headset at computer
DOD Is Finally Leaning Into CMMC 2.0 Requirements for CUI
AFCEA

Event

West

Person using computer

Security

Threat Exposure Management Establishes a Risk-Driven Approach for Federal Agencies

FedTech

Technology Solutions That Drive Business

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Research Everything IT

Tap into practical IT advice from CDW experts

Visit the Research Hub
Get FedTech
in your Inbox
Browse Email
Archives
newsletter screenshot
Subscribe to
FedTech Magazine
Browse Magazine
Archives
Robert Costello, CIO, CISA
  • FedTech:

  • CDW:

Back To Top

Copyright © 2026 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information