<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>FedTech Magazine</title>
    <link>https://fedtechmagazine.com/</link>
    <description></description>
    <language>en</language>
    <atom:link href="https://fedtechmagazine.com/rss-feed.xml" rel="self" type="application/rss+xml"/>
    
    <item>
  <title>SSE vs. SASE: Federal Agencies’ Guide to Cloud Security Architecture</title>
  <link>https://fedtechmagazine.com/article/2026/05/sse-vs-sase-federal-agencies-guide-cloud-security-architecture-perfcon</link>
  <description>As federal agencies advance zero-trust initiatives and support hybrid work, traditional perimeter-based security models are giving way to cloud-delivered approaches. Users are no longer confined to agency networks, and applications increasingly reside in Software as a Service (SaaS) and multicloud environments.
This shift is driving interest in two closely related frameworks: security service edge and secure access service edge (SASE). While the terms are often used interchangeably, they represent distinct approaches to delivering security — and understanding the difference is critical for…</description>
    <pubDate>Tue, 05 May 2026 11:44:29 -0400</pubDate>
    <dc:creator>Jessica Balen</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/05/sse-vs-sase-federal-agencies-guide-cloud-security-architecture-perfcon</guid>
  </item>
<item>
  <title>Federal Agencies Can Use AI Now for Human-AI Collaboration</title>
  <link>https://fedtechmagazine.com/article/2026/05/federal-agencies-can-use-ai-now-human-ai-collaboration</link>
  <description>Artificial intelligence isn’t a future-state capability for federal agencies; it’s a present-day force multiplier.
The most important shift is mindset: AI is not here to replace the workforce. It augments it. Human-AI collaboration works because humans and AI recognize patterns differently, and combining those perspectives leads to better decisions, faster execution and stronger outcomes.
The opportunity is immediate — and so is the urgency.
Click the banner below to consider building infrastructure that supports AI.</description>
    <pubDate>Mon, 04 May 2026 14:21:29 -0400</pubDate>
    <dc:creator>Asim Iqbal</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/05/federal-agencies-can-use-ai-now-human-ai-collaboration</guid>
  </item>
<item>
  <title>Prioritizing Data Readiness in Federal AI Adoption</title>
  <link>https://fedtechmagazine.com/article/2026/04/prioritizing-data-readiness-federal-ai-adoption</link>
  <description>Federal agencies are accelerating their use of artificial intelligence to drive innovation, improve efficiency and enhance mission delivery. Recent White House executive orders, including America’s AI Action Plan and Ensuring a National Policy Framework for Artificial Intelligence, reinforce AI as a strategic priority across government.
Federal use cases reflect that momentum. The Department of Veterans Affairs’ 2025 AI inventory lists more than 350 initiatives supporting clinical decision-making and fraud detection efforts. The Centers for Medicare &amp;amp; Medicaid Services has reported…</description>
    <pubDate>Thu, 30 Apr 2026 13:11:54 -0400</pubDate>
    <dc:creator>Bryan Thomas</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/04/prioritizing-data-readiness-federal-ai-adoption</guid>
  </item>
<item>
  <title>NOAA Relies on Cloud Computing to Evolve Hurricane Predictions</title>
  <link>https://fedtechmagazine.com/media/video/noaa-relies-cloud-computing-evolve-hurricane-predictions</link>
  <description>The agency’s ability to predict hurricane forecasting has received a serious boost thanks to meaningful investments in cloud. The Hurricane Analysis and Forecast System (HAFS) allows multiple models to run predictions and forecasts as part of the agency’s Climate Prediction Center, and it’s powered by cloud computing resources from Amazon Web Services and Microsoft Azure.
The National Center for Weather and Climate Prediction, which is part of NOAA’s National Weather Service, is considered the operational center for NOAA. As weather becomes more volatile and less predictable, improving the…</description>
    <pubDate>Tue, 28 Apr 2026 16:18:57 -0400</pubDate>
    <guid isPermaLink="true">https://fedtechmagazine.com/media/video/noaa-relies-cloud-computing-evolve-hurricane-predictions</guid>
  </item>
<item>
  <title>DMDC Improves Access for Millions Via Okta Identity Management</title>
  <link>https://fedtechmagazine.com/article/2026/04/dmdc-improves-access-millions-okta-identity-management</link>
  <description>For years, a forgotten password could mean a long wait on hold for millions of Defense Department users trying to access critical benefits or health information. That friction — multiplied across service members, families and retirees — became a defining challenge for the Defense Manpower Data Center (DMDC), which manages identity records for one of the largest user populations in government.
Now, that experience is changing.
DMDC has overhauled its approach to identity management by replacing its legacy DS Logon system with a modern, cloud-based platform built on Okta. The shift is enabling…</description>
    <pubDate>Tue, 28 Apr 2026 13:48:03 -0400</pubDate>
    <dc:creator>Mickey McCarter</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/04/dmdc-improves-access-millions-okta-identity-management</guid>
  </item>
<item>
  <title>The Supply Chain Is the Breach Vector. Data Recovery Is the Power Move.</title>
  <link>https://fedtechmagazine.com/article/2026/04/supply-chain-breach-vector-data-recovery-power-move</link>
  <description>After going undetected for months, the Notepad++ compromise by malicious actors confirms what more organizations are learning: If the software is deployed, it’s already a threat.
Organizations must assume that the software they depend on is already compromised and the adversary is operating inside the stack.
A trusted editor — familiar to every developer, sys admin and security professional — became the delivery channel for software supply chain attacks that can bypass zero-trust architecture protections.
In today’s environment, the supply chain is the attack surface and a high-value target.…</description>
    <pubDate>Mon, 27 Apr 2026 11:29:33 -0400</pubDate>
    <dc:creator>Travis Rosiek</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/04/supply-chain-breach-vector-data-recovery-power-move</guid>
  </item>
<item>
  <title>Tackling Hybrid IT Infrastructure Challenges in the Government Sector</title>
  <link>https://fedtechmagazine.com/article/2026/04/tackling-hybrid-it-infrastructure-challenges-government-sector</link>
  <description>Cloud technology has rapidly transformed the private sector over the past five years. Federal departments and agencies across all domains are taking a measured, strategic approach to evaluating the long-term value of migrating to the cloud. As the federal government continues to shift some assets to the cloud, agencies that manage sensitive information are still required to maintain on-premises systems, resulting in complex hybrid IT infrastructures that span both on-premises and cloud environments.
The ideal hybrid IT infrastructure for the federal government should seamlessly integrate on-…</description>
    <pubDate>Thu, 23 Apr 2026 17:05:51 -0400</pubDate>
    <dc:creator>Travis Galloway</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/04/tackling-hybrid-it-infrastructure-challenges-government-sector</guid>
  </item>
<item>
  <title>Modernizing Federal Applications Without Disrupting Mission-Critical Systems</title>
  <link>https://fedtechmagazine.com/article/2026/04/modernizing-federal-applications-without-disrupting-mission-critical-systems</link>
  <description>Federal agencies are under growing pressure to modernize aging application portfolios, but many are moving too fast without understanding the full scope of what they’re trying to fix.
So says Greg Peters, chief architect for Strategic Application Modernization Assessment (SAMA) at CDW, who believes many public sector organizations pursue cloud migrations or digital transformation initiatives without first addressing fundamental issues hidden inside their application stacks.
“Most organizations are reacting to directives from elected officials, the CIO or the CTO to move to the cloud,” Peters…</description>
    <pubDate>Tue, 21 Apr 2026 14:54:18 -0400</pubDate>
    <dc:creator>Mickey McCarter</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/04/modernizing-federal-applications-without-disrupting-mission-critical-systems</guid>
  </item>
<item>
  <title>Enterprise Service Management Gains Ground Across Federal Agencies Amid Demands</title>
  <link>https://fedtechmagazine.com/article/2026/04/enterprise-service-management-gains-ground-across-federal-agencies-amid-demands</link>
  <description>Federal agencies are rethinking how they deliver internal services as mission demands grow more complex and workforce expectations continue to evolve. That shift is driving increased interest in enterprise service management, or ESM, as agencies look to unify service delivery across departments, reduce operational friction and build a foundation for artificial intelligence.
“I think it’s really a shift in expectations within their workforce,” says Jimmy Schmitzer, a principal field solution architect at CDW. “Hybrid work, automation opportunities and the rising awareness of what AI can do is…</description>
    <pubDate>Mon, 20 Apr 2026 15:25:53 -0400</pubDate>
    <dc:creator>Mickey McCarter</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/04/enterprise-service-management-gains-ground-across-federal-agencies-amid-demands</guid>
  </item>
<item>
  <title>Threat Exposure Management Establishes a Risk-Driven Approach for Federal Agencies</title>
  <link>https://fedtechmagazine.com/article/2026/04/threat-exposure-management-establishes-risk-driven-approach-federal-agencies</link>
  <description>Federal agencies face a relentless stream of newly disclosed vulnerabilities, evolving attack techniques and growing pressure from leadership to demonstrate measurable risk reduction. For many public sector IT and security teams, traditional vulnerability management programs are no longer enough.
Continuous threat exposure management offers a path forward. According to CDW security leaders, CTEM represents a shift from counting vulnerabilities to managing real business risk.
“CTEM is a risk management strategy,” says Charles Cartwright, executive technology strategist for CDW. “It’s a risk…</description>
    <pubDate>Thu, 16 Apr 2026 14:21:55 -0400</pubDate>
    <dc:creator>Mickey McCarter</dc:creator>
    <guid isPermaLink="true">https://fedtechmagazine.com/article/2026/04/threat-exposure-management-establishes-risk-driven-approach-federal-agencies</guid>
  </item>

  </channel>
</rss>