Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • Feds in the Field
    • CapITal
    • About Insider
  • Search

Main menu

  • Topics
  • Agencies
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • More
    • Reviews
    • News
    • Events
    • Feds in the Field
    • CapITal
    • About Insider
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

Windows 10 tips and tricks

Software

Manage Windows 10 Settings for Better Performance

HP EliteBook Folio 9480m Ultrabook

Hardware

Review: HP EliteBook Folio 9480m Ultrabook Performs Like a Desktop

Person working from home

Digital Workspace

How Federal Agencies Can Prepare Employees for Permanent Remote Work

FedTech 30 IT Influencers to Follow
30 Federal IT Influencers Worth a Follow in 2022
Sep 06 2022

As federal agencies take on executive orders demanding upgrades in cybersecurity and customer service, these technology leaders can offer guidance and support.

FedTech Winter 2022 cover

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Security Save

Cartoon of a man juggling computer icons

Security

Do More to Protect Your Application Programing Interfaces

These six tips will provide more security for critical APIs.

Webbed Monitor

Security

Protect All the Things: 3 Areas of Focus for Protecting Federal IoT Devices
FT-SecSav-Q2.jpg

Security

Despite Patches, Continue to Monitor Open-Source Code and Software for Vulnerabilities
FT71_SecuritySave_Scarfone

Security

3 Tips That Can Help Agencies Inventory Security Tools for a Zero-Trust Environment
cybersecurity sandbox

Security

Smarter Malware Creates the Need for Stronger Detection
Purple teaming

Security

Purple Teams Add Power to Network Penetration Testing for Federal Agencies
Securing devices

Security

3 Best Practices for Returning Telework Devices Safely to the Workplace
NGFW next generation firewall

Security

Take These Steps to Build a Unified Next-Generation Firewall Strategy
Azure cloud security

Cloud

Use These Tools to Protect Against Microsoft Cloud Hacks
IT security supply chain

Security

How Agencies Can Tackle Supply Chain Cybersecurity Threats
stop sign

Security

Automating TLS/SSL Renewals Can Help Avoid Website Disasters for Agencies
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

Windows 10 tips and tricks

Manage Windows 10 Settings for Better Performance

HP EliteBook Folio 9480m Ultrabook

Review: HP EliteBook Folio 9480m Ultrabook Performs Like a Desktop

Person working from home

How Federal Agencies Can Prepare Employees for Permanent Remote Work

Review: Dell’s OptiPlex 7050 Was Designed with Feds in Mind

Person working in data center

Security

Federal Agencies Can Learn from the FDA’s Cybersecurity Modernization Action Plan

FedTech

Technology Solutions That Drive Government

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get FedTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to FedTech Magazine Browse Magazine Archives
FedTech Winter 2022 cover
Back To Top

Copyright © 2023 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information