Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home Home MENU
Log in
Mobile menu
  • Topics
  • Agencies
  • Features
  • Tips & Tactics
  • Video
  • CapITal
  • Events
  • More
  • Search
Main menu
  • Topics
  • Agencies
  • Features
  • Tips & Tactics
  • Video
  • CapITal
  • Events
  • More
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Artificial Intelligence
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

What Is Biometric Authentication?
Security
How the Government Uses Biometric Authentication Technology
What Is Disaster Recovery as a Service (DRaaS)?
Cloud
What Is Disaster Recovery as a Service, and How Can It Help Feds?
Doctor reviewing images
Security
FDA Tightens Its Medical Device Cybersecurity Guidance
  • About Insider
  • Feds in the Field
  • News
  • Reviews
  • Telehealth
  • The Byte
  • Voices
2025 influencers
24 Federal IT Influencers Worth Following in 2025
Dec 01 2025

These government leaders are charting the course for agencies’ IT modernizations, cybersecurity and AI futures in the era of government efficiency.

Robert Costello, CIO, CISA

FedTech Magazine

Current Issue | Archive
  • twitter
  • feed

Security Save

Conceptual AI letters against red lights

Security

How AI Can Accelerate Zero Trust for Agencies

With secure access service edge solutions, agencies can implement scalable protections driven by artificial intelligence.

Close

New Research from CDW on Workplace Friction

Learn how IT leaders are working to build a frictionless enterprise.

Click Here to Read the Report
Person using multiple devices

Security

How the Internet of Things Can Impact Agency Security
Cartoon of a man juggling computer icons

Security

Do More to Protect Your Application Programing Interfaces
Webbed Monitor

Security

Protect All the Things: 3 Areas of Focus for Protecting Federal IoT Devices
FT-SecSav-Q2.jpg

Security

Despite Patches, Continue to Monitor Open-Source Code and Software for Vulnerabilities
FT71_SecuritySave_Scarfone

Security

3 Tips That Can Help Agencies Inventory Security Tools for a Zero-Trust Environment
cybersecurity sandbox

Security

Smarter Malware Creates the Need for Stronger Detection
Purple teaming

Security

Purple Teams Add Power to Network Penetration Testing for Federal Agencies
Securing devices

Security

3 Best Practices for Returning Telework Devices Safely to the Workplace
NGFW next generation firewall

Security

Take These Steps to Build a Unified Next-Generation Firewall Strategy
Azure cloud security

Cloud

Use These Tools to Protect Against Microsoft Cloud Hacks
  • Load More Stories

Advertisement

Trending Now

What Is Biometric Authentication?
How the Government Uses Biometric Authentication Technology
What Is Disaster Recovery as a Service (DRaaS)?
What Is Disaster Recovery as a Service, and How Can It Help Feds?
Doctor reviewing images
FDA Tightens Its Medical Device Cybersecurity Guidance
Person using headset at computer
DOD Is Finally Leaning Into CMMC 2.0 Requirements for CUI
AFCEA

Event

West

Photography by David Keith Photography

Artificial Intelligence

State Department Cyber Leader: AI Must Serve Mission Outcomes, Not Drive Them

FedTech

Technology Solutions That Drive Business

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • FedTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • EdTech
  • StateTech
  • HealthTech

Research Everything IT

Tap into practical IT advice from CDW experts

Visit the Research Hub
Get FedTech
in your Inbox
Browse Email
Archives
newsletter screenshot
Subscribe to
FedTech Magazine
Browse Magazine
Archives
Robert Costello, CIO, CISA
  • FedTech:

  • CDW:

Back To Top

Copyright © 2026 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information