Can Government Adopt Emerging Tech?

Can Government Adopt Emerging Tech?

Date: April 29, 2019
Tags: , , , ,

Is Federal Government in a Position to Adopt Emerging Tech? Keplinger Responds to Fed Scoop

In a recent interview with Fed Scoop, T-Rex CTO, Jason Keplinger shares his perspective on the adoption of emerging technologies in the federal space. The federal government has put into place two important building blocks that will aid the adoption of technology:

1.Flexible strategy that continues to evolve such as the migration from Cloud First to Cloud Smart

2.Working with Integrators who know how to take vendor-agnostic product/solutions that help agencies to meet their mission in an enterprise fashion

Listen to Part 2 of his interview below:


recently posted
Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]

T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]