Insights

The Federal Threat: 98% of npm & PyPI Malware Neutralized With a Source-First Approach

<p>Recent npm and PyPI attacks underscore the urgency for more trusted open-source dependencies across civilian agencies. Chainguard&rsquo;s research, which analyzes thousands of malicious packages, shows that rebuilt-from-source libraries can prevent nearly all known malware - signaling a fundamental shift in how federal software supply chains can be secured. This secure-by-default approach isn&rsquo;t just an improvement; it represents a groundbreaking change in how the government can build, trust, and operate modern software.</p>

Modernizing Roadway Management for a Safer, More Efficient Future

<p>Still relying on costly, resource-intensive manual inspections for your roadway management?</p> <p>There&rsquo;s a smarter way to monitor infrastructure using crowdsourced dashcam imagery, passively collected from vehicles already on the road. This data powers automated AI models that detect issues like fading lane paint, damaged signs, and debris, giving you near real-time awareness across more of your network.</p> <p>No more waiting weeks for inspection cycles. You get faster insights that enable quicker responses and a better use of resources.</p> <p>Learn how agencies are using automation to gain visibility without extra fieldwork.</p>

Planning Smarter: From Reactive to Proactive Transportation Planning

<p>From long-range plans to daily maintenance decisions, today&rsquo;s transportation teams are expected to do more, with greater precision, transparency, and impact.</p> <p>&ldquo;A Planner&rsquo;s Guide to Data-Driven, Resilient, and Equitable Networks&rdquo; is designed to help you meet that challenge. Whether you&rsquo;re shaping multiyear strategies or optimizing daily asset management, this guide offers proven ways to plan smarter with better data.</p> <p>Inside, you&rsquo;ll find actionable insights to help you:</p> <ul> <li> <p>Build transportation plans that align with resilience, equity-focused, and community priorities</p> </li> <li> <p>Meet provincial and territorial reporting standards with less overhead</p> </li> <li> <p>Apply AI and street-level imagery to both strategic planning and ongoing maintenance</p> </li> <li> <p>Shift from reactive response to proactive, data-informed decision-making</p> </li> </ul> <p>Turn complexity into clarity with a guide built for modern planning.</p>

Delivering Innovative Solutions for the U.S. Department of Defense: Shift5’s Journey with Chainguard

<p>Shift5 partnered with Chainguard to strengthen security, eliminate CVEs, and maintain continuous compliance for its Department of Defense customers&mdash;all while accelerating development. By using Chainguard&rsquo;s zero-CVE, FIPS-validated images, Shift5 cut months of manual work, sped up ATO readiness, and delivered more secure, reliable solutions across critical OT environments. Download the full asset to see how Chainguard helped Shift5 boost performance, compliance, and customer trust.</p>

Interoperability and modernization: Competition drives progress

By reducing vendor lock-in, an open-source and standards-based approach to government technology solutions will result in greater efficiency, productivity and innovation.

NASCIO 2025 Special Report

<p> <style type="text/css"><!--br {mso-data-placement:same-cell;}--> </style> Route Fifty&#39;s best coverage on the NASCIO Conference 2025.</p>

Balancing the scales of conflict.

Strategies are helping allied leaders counter an emerging “axis of autocracy” in the Indo-Pacific.

Future-Ready Workforce

<p> <style type="text/css"><!--br {mso-data-placement:same-cell;}--> </style> As efforts to digitize federal systems and bring on emerging tech like artificial intelligence grow, we&rsquo;ll explore how agencies are increasingly in need of employees that know how to work with such systems.</p>

Zero Trust Security for Government Agencies

<p>In the evolving landscape of IT security, government agencies face increasingly sophisticated cyber threats that traditional security models are not equipped to address.</p> <p>Learn about the critical considerations and foundational elements you need to consider when implementing a zero trust security strategy in our comprehensive e-book, &ldquo;Zero trust security for government agencies.&rdquo;</p>

Joint Enterprise License Agreement (JELA): Exclusive Cybersecurity Licensing for the Department of Defense

<p>The Palo Alto Networks JELA provides a secure and modern foundation for DoD information, delivering optimized value and streamlined acquisition through best- of-breed cybersecurity solutions. With DoD personnel (both uniformed and civilian) dispersed across the globe, ensuring consistent access to advanced cybersecurity capabilities is essential to protecting mission-critical operations.</p>

Federal Perspectives on 5G and Network Slicing

Federal agencies’ priorities and challenges in adopting next-generation wireless technologies

Future of the Army

<p> <style type="text/css"><!--br {mso-data-placement:same-cell;}--> </style> Read Defense One&rsquo;s in-depth coverage of the 2025 AUSA conference to learn more about the future of Army operations, tech, more.</p>

5 Critical Steps to Improve Your Organization's Cyber Resilience

<p>This eBook&nbsp;presents a five-step progression towards cyber resilience. By taking concrete actions across all five steps, you&rsquo;ll align with best practices in cyber response and recovery. You&rsquo;ll also see&nbsp;substantial benefits in terms of security, cost savings, and reduced risk.</p>

AI and the future of procurement and contracting

Artificial intelligence, already transforming government operations, is now being tapped to streamline and speed government contracting processes.

Carahsoft | Raising the Bar for Network Defense

Seizing the Strategic Advantage in Cybersecurity

No content found