DoW Cybersecurity: Challenges, Solutions and Implications

More than 15 years ago, the DoW formally elevated cyber pursuits to the same strategic level as sea, land, air and space. This acknowledgement shifted cybersecurity from risk management to a national defense need, underscoring the importance of protecting the DoW’s defense infrastructure and networks. Defense cybersecurity challenges have since evolved into a multi-domain conflict, particularly with China and Russia - both aiming to infiltrate digital assets.

FY27 Federal Budget Request: What You Need to Know

The FY27 federal budget request was released on April 3rd, and is providing an initial look at the momentum and impact IT investments will have in the coming years.

The Department of War’s unprecedented $1.5T request underscores attention on national security and pushing towards next-generation warfighting capabilities, while across the whole of government, there is expected to be a continued mandate to drive efficiency, consolidate systems and align technology investments with administration priorities.

Key Smart City Trends From Smart Cities Connect 2026

During this year’s Smart Cities Connect Conference and Expo in Raleigh, NC, one topic garnered considerable attention: AI. Within many city governments, AI is past experimentation and has moved into production. In 2026, city IT leaders are prioritizing  safe, secure, and data-driven AI deployments that deliver measurable outcomes in mobility, public safety, infrastructure management, and climate resilience.

However, as cities move toward operational AI, challenges exist around data readiness, governance, and integration across departments.

Fresh SLED Insights for 2026 From Beyond the Beltway

This year’s Beyond the Beltway conference highlighted key strategic findings from IT leaders that signal where 2026 technology investments will be made and where to focus efforts for success. In 2026, state and local governments are at an inflection point: with rising expectations evolving alongside tightening budgets, staffing and timelines, success will depend on alignment of solutions to modernization requirements, workforce challenges and measurable ROI-driven outcomes.

Inside the Navy’s Hedge Strategy: Scaling Asymmetric, Combat-Ready Naval Power

In early February, Chief of Naval Operations Admiral Daryl Caudle unveiled the details of the US Navy’s 2026 Hedge Strategy. As the Navy is facing a great power competition, rapid technological change and strain on the defense industrial base, it is critical to adapt an innovative operational and strategic approach to maintain adversarial advantage. The strategy shifts away from dominance by mass towards a risk-balanced operational approach that has asymmetric, combat-ready capability. In other words, they are “hedging their bets” on more tailored capabilities and nimble operations.

The FY26 NDAA’s IT Call-Outs

table, th, td { border: 1px solid #c9edfa; padding: 5px; }

The National Defense Authorization Act (NDAA) is passed annually to define the Department of Defense’s priorities and guide how funds are allocated. While it doesn’t directly appropriate money, it shapes the direction of defense spending and sets the framework for future contracts. This makes it a key indicator of where IT investments and opportunities will emerge.

America by Design: Modernizing Government Services and Opportunities in Technology

In August 2025, President Trump signed an executive order titled “Improving Our Nation Through Better Design,” establishing the new “America by Design” initiative. The order aims to enhance both the digital and physical experiences of government services and facilities, signaling a major modernization effort focused on design, technology and user experience.

Key Cyber Law Expires Amid Shutdown: Implications of the CISA 2015 Lapse

As the U.S. marks Cybersecurity Awareness Month, a critical pillar of the nation’s digital defense has expired. On September 30th, Congress failed to pass a continuing resolution, furloughing many federal cybersecurity staff and allowing the Cybersecurity Information Sharing Act (CISA) of 2015 to lapse as cyber threats are reaching unprecedented levels. The Cybersecurity and Infrastructure Security Agency, which spearheaded much of the law’s implementation, has also furloughed nearly two-thirds of its workforce.