Acting National Cyber Director, Kemba Walden, discusses the new National Cybersecurity Strategy at the Center for Strategic and International Studies. How will the U.S. government move forward on ...
Digital transformation efforts are rapidly accelerating in the public sector. Spurred in part by the pandemic — and now, as state and local governments pivot to meet rising constituent expectations — ...
I'm the writer for the Forbes C-Suite newsletter series. The domestic indicators don’t look that great, as far as rate cuts are concerned. May’s job growth was much stronger than expected, with ...
CaptivateIQ reports 92% of companies want to change their incentive strategy, but only 12% can implement changes in under two ...
Despite over 96% of hospitals having an electronic health record (EHR), a recent study showed alarming levels of dissatisfaction among physicians with their current EHR systems and an increased ...
The White House released its implementation plan for President Biden’s National Cybersecurity Strategy, broadly breaking down how it plans to accomplish more than 65 tasks involving 18 agencies ...
Forbes contributors publish independent expert analyses and insights. I'm a global philanthropy advisor and author of Delusional Altruism. Inaction has a price. Hesitating to put a new strategic plan ...
As the fifth generation (5G) of mobile communications becomes the norm in civilian life, Department of Defense (DoD) leaders are also working on making it the standard on military bases. Now that ...
The Department of Defense has released a document providing a roadmap on how DOD will advance the responsible use of artificial intelligence. The Responsible Artificial Intelligence Strategy and ...
Real-World and Clinical Trial Validation of a Deep Learning Radiomic Biomarker for PD-(L)1 Immune Checkpoint Inhibitor Response in Advanced Non–Small Cell Lung Cancer Artificial intelligence (AI) ...
By throwing a wrench in the state’s Regional Haze State Implementation Plan, advocates say HECO can sidestep rules years in ...
Approval and sponsorship for an information security strategy is only the beginning. Implementation of the strategy is when risk is truly mitigated, and applying these five principles is vital to ...