<p>Recent npm and PyPI attacks underscore the urgency for more trusted open-source dependencies across civilian agencies. Chainguard’s research, which analyzes thousands of malicious packages, shows that rebuilt-from-source libraries can prevent nearly all known malware - signaling a fundamental shift in how federal software supply chains can be secured. This secure-by-default approach isn’t just an improvement; it represents a groundbreaking change in how the government can build, trust, and operate modern software.</p>
<p>Still relying on costly, resource-intensive manual inspections for your roadway management?</p>
<p>There’s a smarter way to monitor infrastructure using crowdsourced dashcam imagery, passively collected from vehicles already on the road. This data powers automated AI models that detect issues like fading lane paint, damaged signs, and debris, giving you near real-time awareness across more of your network.</p>
<p>No more waiting weeks for inspection cycles. You get faster insights that enable quicker responses and a better use of resources.</p>
<p>Learn how agencies are using automation to gain visibility without extra fieldwork.</p>
<p>From long-range plans to daily maintenance decisions, today’s transportation teams are expected to do more, with greater precision, transparency, and impact.</p>
<p>“A Planner’s Guide to Data-Driven, Resilient, and Equitable Networks” is designed to help you meet that challenge. Whether you’re shaping multiyear strategies or optimizing daily asset management, this guide offers proven ways to plan smarter with better data.</p>
<p>Inside, you’ll find actionable insights to help you:</p>
<ul>
<li>
<p>Build transportation plans that align with resilience, equity-focused, and community priorities</p>
</li>
<li>
<p>Meet provincial and territorial reporting standards with less overhead</p>
</li>
<li>
<p>Apply AI and street-level imagery to both strategic planning and ongoing maintenance</p>
</li>
<li>
<p>Shift from reactive response to proactive, data-informed decision-making</p>
</li>
</ul>
<p>Turn complexity into clarity with a guide built for modern planning.</p>
<p>Shift5 partnered with Chainguard to strengthen security, eliminate CVEs, and maintain continuous compliance for its Department of Defense customers—all while accelerating development. By using Chainguard’s zero-CVE, FIPS-validated images, Shift5 cut months of manual work, sped up ATO readiness, and delivered more secure, reliable solutions across critical OT environments. Download the full asset to see how Chainguard helped Shift5 boost performance, compliance, and customer trust.</p>
By reducing vendor lock-in, an open-source and standards-based approach to government technology solutions will result in greater efficiency, productivity and innovation.
<p>
<style type="text/css"><!--br {mso-data-placement:same-cell;}-->
</style>
As efforts to digitize federal systems and bring on emerging tech like artificial intelligence grow, we’ll explore how agencies are increasingly in need of employees that know how to work with such systems.</p>
<p>In the evolving landscape of IT security, government agencies face increasingly sophisticated cyber threats that traditional security models are not equipped to address.</p>
<p>Learn about the critical considerations and foundational elements you need to consider when implementing a zero trust security strategy in our comprehensive e-book, “Zero trust security for government agencies.”</p>
<p>The Palo Alto Networks JELA provides a secure and modern foundation for DoD information, delivering optimized value and streamlined acquisition through best- of-breed cybersecurity solutions. With DoD personnel (both uniformed and civilian) dispersed across the globe, ensuring consistent access to advanced cybersecurity capabilities is essential to protecting mission-critical operations.</p>
<p>
<style type="text/css"><!--br {mso-data-placement:same-cell;}-->
</style>
Read Defense One’s in-depth coverage of the 2025 AUSA conference to learn more about the future of Army operations, tech, more.</p>
<p>This eBook presents a five-step progression towards cyber resilience. By taking concrete actions across all five steps, you’ll align with best practices in cyber response and recovery. You’ll also see substantial benefits in terms of security, cost savings, and reduced risk.</p>