Kate Macri | GovernmentCIO Media & Research

Kate Macri

Deputy Editor
Profile picture for user Kate Macri

Kate Macri is Deputy Editor for GovCIO Media & Research, where she covers the Department of Defense and helps lead the editorial team.

Prior to joining the team in June 2020, she covered the video game industry and small businesses for Zenger News. She also covered banking and finance news for Banking Dive, a B2B media publication based in Washington D.C., and reported logistics, supply chain and shipping news for Supply Chain Dive.

If she isn't boxing or walking her boxer, you can find Kate with her nose in a Stephen King novel, slaying monsters in the world of Final Fantasy or waiting for a blue public call box to land in her front yard.


DISA leadership brief how partnerships will impact new cloud efforts.

Narratives around zero trust, AI and user experience will drive ongoing developments in defense technology.

Defense cloud leaders dissect cloud security myths and challenges, with DevSecOps and zero trust as the pillars of a secure hybrid cloud.

Cybersecurity concerns resulting from the Russia-Ukraine war are leading to new security approaches for satellites.

Reducing technical debt, ensuring zero trust cybersecurity across all connected systems, and developing a strong data foundation will be critical for winning future conflicts.

Good cyber defense comes down to consistent communication and information-sharing.

CISA Director Jen Easterly wants to make cyber defense and collaboration 'sexy.'

Leaders are focused on changing mindsets instead of buying specific tools for zero trust.

The six-month extension will allow DISA to develop a SIPRNet-specific zero trust solution for JADC2.

A software factory named for the legendary UFO repository proves innovation is 'everlong' at the Air Force.

Integrating operational processes across the armed services and information-sharing will hinder JADC2 if left unaddressed.

AI will be a critical component of JADC2, AI leaders said at the NDIA's JADC2 Symposium this week.

DOD space leaders want rapid, iterative development of JADC2 capabilities, but need to communicate securely.

Concepts and mandates such as cyber incident reporting, DevSecOps and zero trust only go so far.

The Air Force and the Chief Digital and AI Office laid out AI development plans.

CYBERCOM Executive Director Dave Frederick discussed his priorities and cyber concerns as the command gets more budgetary control.

Top SOCOM AI and data leaders discuss the importance of data management for AI excellence in an interview and at the DOD Digital & AI Symposium.

Army CIO Dr. Raj Iyer said the department is 'at an inflection point' for IT modernization to meet future threats.

CIO John Sherman and new CDAO Craig Martell reveal priorities for the department's approach to AI.

New DOD Chief Digital and AI Officer Craig Martell said the DOD mission lured him away from Lyft and now wants to develop a culture that appeals to new AI talent as well.

The Army's digital transformation relies on its ability to share data rapidly and securely while iterating on new technologies for a military environment.

A nonprofit organization brings small businesses into the defense contracting fold.

Data and cyber leaders detailed challenges with C2 modernization and how it will be the foundation for JADC2 implementation.

As data collection expands at the tactical edge, the service wants commercial cloud capabilities and cloud-based collaboration tools to process data more efficiently.

DISA cyber leaders will prioritize improving the user experience with cybersecurity to allow for seamless, secure network and data access.

DISA leaders highlighted a common approach to IT modernization at AFCEA TechNet Cyber 2022.

DOD leaders say you can't have JADC2 without zero trust and a "data-centric" approach to cyber.

Modernizing systems for more mobile environments can ensure efficient applications of AI and biometrics in tandem to pinpoint enemies.

CISA encourages all organizations to report immediately and maintain consistent communication until cyber incidents are resolved.

Defense officials described how zero trust, ICAM solutions, DevSecOps and common data standards will optimize JADC2 implementation.

The zero trust prototype will attempt to harmonize existing security solutions for a cloud-first environment.

The spending boost and new requirement come as U.S. critical infrastructure sectors prepare for more cyberattacks.

Kessel Run, DOD's first software factory, is about to help one air combat command unit move all operations to a software environment designed via DevSecOps.

Intelligence, surveillance and reconnaissance (ISR) sensors collect enormous swaths of data. AI can help prioritize data loads for savvier warfighting decisions.

The COVID-19 pandemic made the Enterprise Cloud Management Agency nimbler and more intentional about cloud management and remote work.

CISA Director Jen Easterly encouraged critical infrastructure organizations and federal agencies to aggressively shore up cyber defenses as Russia bombards Ukrainian critical infrastructure with malware.

Organizations should treat zero trust like a mindset rather than as a set of rules or tools.

Agencies managing the immigration process find value in data management priorities within digitization efforts.

Tools like software bills of materials can improve software supply chain visibility and security.

An ICE call center is streamlining surges in case volumes received during the COVID-19 pandemic.

The initiative will help defense leaders develop more aggressive cyber defenses.

The agency has undertaken a cultural shift to implement new shared data visualization efforts supporting its mission.

Defense leads say digital modernization strategies must rely on the right data to serve mission needs.

The service's cyber chief says identity management is key to fulfilling a zero trust strategy.

DOD acquisition officials highlight the value of MTA pathways for acquiring weapons systems.

Zero trust continues to be a major hallmark of cloud security, which includes 5G networks.

Agile methodology will inform all Air Force priorities in 2022, including hybrid cloud and zero trust.

A new Chief Digital and AI Officer will streamline and build upon AI efforts across DOD like those in the Air Force.

Regular user surveys and constant monitoring go a long way.

Federal cyber leaders clamor for cyber incident reporting legislation amid zero trust implementation.

Use cases for the technology are enabling full national security protections across government.

FBI and DOD say government needs to rethink cyber strategies to keep up with cyber attacks.

'As-a-service' models are enabling a digital-first modernization strategy.

Kessel Run hopes its work will encourage more collaboration across the Defense Department.

Ahead of the release of the Army Digital Transformation Strategy, Army CIO Raj Iyer and others discuss what it takes to achieve their vision of a unified network.

Defense leaders say nothing is more important to a sound cyber strategy than culture change.

Data management is a journey, and DHS components try to learn from each other.

Leaders say they will be "ruthless" with their budgets and current investments to drive highly effective, interoperable IT.

DOD's IT modernization challenges warfighters to think beyond tactical skills.

The military branches are coming together to make artificial intelligence capacities to support decision-making a reality.

Cyber incident reporting takes center stage as federal cyber leaders tackle recent security incidents.

The federal community has gleaned similar benefits from automated functions.

Software supply chain risk management and continuous monitoring are key strategies for maintaining a strong cyber posture in the cloud.

The cloud capability does more than improve lag time — it also has the potential to transform federal IT.

Cybersecurity is a challenge in hybrid cloud environments with disparate missions.

The newly announced joint cyber effort is the latest in a series of new initiatives aimed at securing agencies, with CISA leading that way.

From buzzword to White House imperative, zero trust can be a confusing but necessary concept for security strategies.

More education and information-sharing will boost the fight against ransomware, according to federal cyber leaders.

SolarWinds, CISA and the White House issued new information regarding the state of cyber and advised how to better secure critical infrastructure.

Federal agencies can start by applying a zero trust security model to cloud operations.

Women are shaping AI advancement in federal IT and helping to remove biases in data sets.

Department of Homeland Security teams are working to make aging IT infrastructure interoperable and ready for 5G emerging technology.

Eric Hysen brings his experience at USCIS to a reimagined office focused on cybersecurity and data management.

Easterly brings a plethora of offensive cyber and information warfare experience, suggesting a more aggressive cyber focus for the agency.

Cyber vulnerabilities in federal agencies' supply chains aren't going away any time soon, and addressing them will take a consistent, concentrated effort.

The Homeland Security Information Network supports responses to big events like the Super Bowl and emergencies like COVID-19.

The system will ensure defense companies implement appropriate cybersecurity practices and processes.

Public and private data leaders say data security and data readiness are not mutually exclusive.

The Air Force and NSA veteran is charged with implementation of Biden's recent cyber executive order.

The HSI Tip Line plays an important role in ICE investigations, but has relied on outdated IT infrastructure and manual processes.

Transitioning to 5G is a key strategy for federal agencies' network modernization efforts, but the next generation of communication comes with unique supply chain hazards.

DHS cyber leaders have a laundry list of items for federal CISOs to address.

Agency CTOs highlighted the areas they're working on to improve IT across the department.

Greater supply chain transparency and information-sharing will improve federal cyber posture.

Data sharing and interoperability are key for data quality and governance.

Agile requires longstanding culture shifts and decisions rooted in data.

The Department of Veterans Affairs describes data as a "superpower" unlocked by thoughtful data governance.

As cyber crime explodes, cyber experts and federal cyber leaders insist on systemic change.

DHS and CISA want to lead the federal register and private industry by example.

Data readiness and cultural change are key to a successful AI program.

Agile approaches can give agencies a boost in decommissioning legacy systems and forging a path for the tech future.

ICE and NCITE, a DHS S&T COE, highlighted the ways AI can support DHS mission integrity.

The Cyber Crime Center outlines how cyber criminals are using the dark web to commit pandemic-related scams.

CISA and DOD discussed what the U.S. needs to successfully rollout 5G.

Automation and AI can support medical decision-making on the battlefield, but security remains crucial.

Cybersecurity tools and research are the Critical Infrastructure Resilience Institute's specialty.

Federal CISOs discuss mitigation strategies for inevitable cyber attacks.

Automation tools can support decision-making and should complement the workforce.

The Maritime Security Center uses data modeling, radars and sensors to support homeland security missions.

ICE and TSA share lessons learned in data practices after migrating to the cloud.

An Atlantic Council leader advocates for greater empowerment of the CISO role.

The Veterans Benefits Administration overcomes pandemic challenges with advances in GI Bill benefits, mail processing and artificial intelligence.

The Coastal Resilience Center uses modeling software to predict and evaluate hurricane landfalls and flooding hazards.

JAIC's Lt. Gen. Michael Groen aims to integrate AI applications across departments and offices.

Improved information-sharing and basic cyber hygiene are some methods that can prevent major security breaches.

GAO offers a unique perspective on IT challenges faced by the federal register over the past year.

Migrating to the cloud securely does not have to hinder optimal workflows.

Cyber officials discussed their priorities and what federal agencies should focus on this year.

The agency provides a look at how the risks with 5G impact supply chain and uncover new vulnerabilities.

The pandemic accelerated various IT modernization efforts across the agency, with a heavy emphasis on security.

The agency's tech leads saw operational efficiencies in a reorganized IT infrastructure that is adaptable to change.

With all the options out there, the federal government ran into unique interoperability and security issues with communication software.

Public health officials learned a lot from the pandemic, like how to pivot and upscale health IT and improve future interoperability.

Agencies can approach security in hybrid cloud environments, including SaaS and IaaC.

The agency's multi-cloud environment is presenting lessons around security and application migration.

ICE and USCIS have advanced their data strategies with automation over the past year.

Officials from CISA, GSA and NIST say information sharing will be key to managing security risks in the supply chain.

House Republicans are calling for more congressional oversight of IT modernization and cybersecurity.

CISA aims to prevent major supply chain security incidents like the SolarWinds breach from happening again.

Blockchain and 5G are among priorities agencies are exploring for election security and cyber risks.

Kenneth Bible comes from the Marine Corps, where he served as deputy CIO.

CISA is creating a cohesive cybersecurity approach for federal agencies.

RPA fundamentally changed how employees work at the agency by freeing up time spent on manual tasks.

A uniquely positioned DHS S&T Center of Excellence contributed to the COVID-19 response this year.

Continuous monitoring of assets on a cloud server amplify security and privacy.

A research institute is working with the agency to innovate detection and monitoring capabilities around contraband and other illegal imports.

DHS and ICE are standardizing best practices in how they are approaching data policies and use.

The two security methods can enhance overall cybersecurity protocols.

Leaders look to newer focuses in securing their ICT supply chains.

The Office of Intelligence and Analysis has a mix of short-term and long-term goals to achieve electronic records readiness.

Good data and good relationships with cloud service providers can ensure maximum use of CDM dashboards.

The dashboards are only as good as the data quality and input.

DHS, the Air Force and the VA discussed strategies for implementing DevSecOps at a GovernmentCIO Media & Research event.

A new center of excellence is employing emerging technologies to address domestic terrorism trends in the U.S.

Automation, Agile and DevOps could be the blueprints for IT modernization.

A new report lists the biggest weaknesses in the ICT supply chain and what private and federal IT leaders can do to eliminate them.

The organization is working on digital forensic technologies to support cybersecurity.

CISA and a DHS S&T Center of Excellence will develop a nationwide network of cyber institutes for budding cyber professionals.

Strong supplier relationships and accurate data will make or break supply chains as federal agencies modernize their IT.

Leaders discuss execution of cybersecurity is just as important as modernized systems.

The agency is exploring the benefits of technologies like AI, blockchain and RPA in federal procurement.

DHS and the IRS use the technology to streamline IT operations.

The Department of Homeland Security Science & Technology Directorate's centers of excellence are supporting forward-leaning issues through technology innovation.

Using more automation can help federal agencies improve quality of data.

DHS will be a key leader for IT supply chain security efforts, according to a new report.

DHS Deputy CTO Brian Campo said zero trust is all about how you control your data.

The last thing federal agencies, especially health agencies, should do is allow their cyber vigilance to slip.

Through a new website, the agency aims to educate and update travelers on how it uses the NIST-approved facial-recognition technology.

Cybersecurity basics and risk management are key elements of IT supply chain security.

Described as a forward-leaning agency, digital transformation at the agencies ultimately came down to culture.

Rep. Michael Burgess' own health care focuses have shifted in light of the pandemic.

Local municipalities can better detect precursor chemicals from homemade bombs before they detonate.

Federal agencies can't compete with the private sector when it comes to salary. But there are other ways to appeal to IT professionals.

One of the biggest barriers to successful DevOps and Agile processes is a lack of communication and organizational silos.

Artificial intelligence, facial recognition and machine learning could streamline and accelerate technology amid the pandemic.

A new report provides an update on two major IT modernization efforts at DHS.

Veterans Affairs saw a 1,000% increase in telehealth visits since the beginning of the pandemic.

The Coast Guard deployed the new EHR system at four pilot sites in California this month.

The directorate's IT modernization efforts are still on schedule despite challenges amid the pandemic.

Frameworks including zero trust and edge security can vastly improve government cybersecurity.

The pandemic has changed the way federal organizations think about DevOps and adaptability.

Federal officials advised agencies to rethink their cybersecurity strategies in terms of data and disinformation.

Senior federal officials urge colleagues to adopt a human-centric approach to security.

Zero trust is more than verifying users, it's also verifying infrastructure.

Best practices leverage agility for keeping data secure as federal agencies move away from legacy IT systems.

AI and automation are helping the agencies streamline their cloud strategies.

DHS and DARPA are using AI to address public health concerns.

Resources and talent only go so far if you're not aware of which systems are most vulnerable and still clicking on phishing emails.

Defense agencies tackled intricate cybersecurity challenges to prepare for remote work.

For many agencies, extended telework policies may require reevaluation of cyber risk posture.

Senior officials from DHS, DOJ and the FBI say smart data practices help them telework more efficiently.

George Washington University's program will focus on transitioning security technology prototypes to usable products.

The Science and Technology Directorate continues to explore new ways to alleviate the pandemic.

As weather patterns change rapidly, the federal agency looks to update data for its flood analysis more quickly and efficiently.

The Science & Technology Directorate sees improvements for quickly approving mobile apps for government use.

As agencies increase connectivity capabilities, they also increase their cyber risk.

Following major cyber incidents, cybersecurity experts push for CISA support and a National Cyber Director.

As government agencies go digital, increased cyber risks require a holistic approach.

Congressional representatives say the position would be the best way for the U.S. to prevent and address cyber incidents efficiently.

CISA and NSA provide guidance for how federal agencies can address critical vulnerabilities in their networks.

CBP is using an integrated cloud approach in support of the national security mission across its agencies.

GSA officials explained how mission-driven IT allows federal agencies to pivot more quickly during times of crisis.

With phishing and the upcoming election, securing infrastructure remains a top necessity that initiatives like TIC 3.0 will advance.

The agency saw substantial improvements in how it applies technology to better service veterans.