SAIC CEO Toni Townes-Whitley

The top executive at SAIC today pointed to the company’s mission of creating technology solutions to help solve national security problems, and in particular to the role of its “innovation factory” approach to doing so. […]

Lauren Knausenberger, Air Force CIO
Lauren Knausenberger, Air Force CIO

U.S. Air Force Chief Information Officer (CIO) Lauren Knausenberger detailed her team’s efforts on the zero trust security migration during a Billington Cybersecurity webinar this week, and said that move to new security paradigm has generated traction and “unity of effort unlike I have seen in my tenure.” […]

Lauren Knausenberger, Air Force CIO
Lauren Knausenberger, Air Force CIO
AI

As the Department of the Air Force deploys AI to maintain a competitive advantage and equip warfighters with the most effective tools to do their job, CIO Lauren Knausenberger said her agency is taking a “human-in-the-loop” approach to maintain strong ethical guidelines. […]

Nicolas Chaillan, the first-ever chief software officer (CSO) of the United States Air Force (USAF) and co-lead of the Department of Defense (DoD) Enterprise DevSecOps Initiative, announced his resignation today in a post on LinkedIn. […]

Air Force

The United States Air Force (USAF) on August 17 named Jay Bonci – a private sector cybersecurity veteran – as the service branch’s next chief technology officer (CTO), according to a post by Bonci. […]

Air Force
Air Force

The Air Force has named Lauren Knausenberger as deputy CIO, an Air Force spokesperson confirmed to MeriTalk today. Knausenberger fills the position left by Bill Marion at the end of April. […]

Air Force

Lauren Knausenberger, the chief transformation officer of the United States Air Force, said the pre-pandemic culture in the service was, “you’re not really working if you’re remote,” but explained that the service’s culture has shifted quickly out of necessity.  […]

The digital transformation in government IT is driving modernization but also expanding the attack surface Federal agencies have to protect. The traditional perimeter no longer exists. Today, there is no “inside” or “outside” the network when it comes to detecting, defending, and deterring cyber attacks. […]

Categories