[{"data":1,"prerenderedAt":512},["ShallowReactive",2],{"/en-us/the-source/authors/rob-smith":3,"footer-en-us":31,"the-source-banner-en-us":374,"the-source-navigation-en-us":386,"the-source-newsletter-en-us":414,"footer-source-/en-us/the-source/authors/rob-smith/":425,"authors-en-us":435,"categories-en-us":470,"rob-smith-articles-list-en-us":471},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"type":8,"slug":9,"config":10,"seo":12,"content":15,"_id":25,"_type":26,"title":14,"_source":27,"_file":28,"_stem":29,"_extension":30},"/en-us/the-source/authors/rob-smith","authors",false,"","author","rob-smith",{"layout":11},"the-source",{"config":13,"title":14},{"noIndex":6},"Rob Smith",[16,23],{"type":17,"componentName":17,"componentContent":18},"TheSourceAuthorHero",{"name":14,"role":19,"headshot":20},"Public Sector Area Vice President, GitLab",{"altText":14,"config":21},{"src":22},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1760625579/ndksqvsfysea4cnltb1r.jpg",{"type":24,"componentName":24},"TheSourceArticlesList","content:en-us:the-source:authors:rob-smith.yml","yaml","content","en-us/the-source/authors/rob-smith.yml","en-us/the-source/authors/rob-smith","yml",{"_path":32,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"data":34,"_id":370,"_type":26,"title":371,"_source":27,"_file":372,"_stem":373,"_extension":30},"/shared/en-us/main-footer","en-us",{"text":35,"source":36,"edit":42,"contribute":47,"config":52,"items":57,"minimal":362},"Git is a trademark of Software Freedom Conservancy and our use of 'GitLab' is under license",{"text":37,"config":38},"View page source",{"href":39,"dataGaName":40,"dataGaLocation":41},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":43,"config":44},"Edit this page",{"href":45,"dataGaName":46,"dataGaLocation":41},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":48,"config":49},"Please contribute",{"href":50,"dataGaName":51,"dataGaLocation":41},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":53,"facebook":54,"youtube":55,"linkedin":56},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[58,116,173,232,300],{"title":59,"links":60,"subMenu":76},"Pricing",[61,66,71],{"text":62,"config":63},"View plans",{"href":64,"dataGaName":65,"dataGaLocation":41},"/pricing/","view plans",{"text":67,"config":68},"Why Premium?",{"href":69,"dataGaName":70,"dataGaLocation":41},"/pricing/premium/","why premium",{"text":72,"config":73},"Why Ultimate?",{"href":74,"dataGaName":75,"dataGaLocation":41},"/pricing/ultimate/","why ultimate",[77],{"title":78,"links":79},"Contact Us",[80,85,90,95,100,105,110],{"text":81,"config":82},"Contact sales",{"href":83,"dataGaName":84,"dataGaLocation":41},"/sales/","sales",{"text":86,"config":87},"Support portal",{"href":88,"dataGaName":89,"dataGaLocation":41},"https://support.gitlab.com","support portal",{"text":91,"config":92},"Customer portal",{"href":93,"dataGaName":94,"dataGaLocation":41},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":96,"config":97},"Status",{"href":98,"dataGaName":99,"dataGaLocation":41},"https://status.gitlab.com/","status",{"text":101,"config":102},"Terms of use",{"href":103,"dataGaName":104,"dataGaLocation":41},"/terms/","terms of use",{"text":106,"config":107},"Privacy statement",{"href":108,"dataGaName":109,"dataGaLocation":41},"/privacy/","privacy statement",{"text":111,"config":112},"Cookie preferences",{"dataGaName":113,"dataGaLocation":41,"id":114,"isOneTrustButton":115},"cookie preferences","ot-sdk-btn",true,{"title":117,"links":118,"subMenu":129},"Product",[119,124],{"text":120,"config":121},"DevSecOps platform",{"href":122,"dataGaName":123,"dataGaLocation":41},"/platform/","devsecops platform",{"text":125,"config":126},"AI-Assisted Development",{"href":127,"dataGaName":128,"dataGaLocation":41},"/gitlab-duo/","ai-assisted development",[130],{"title":131,"links":132},"Topics",[133,138,143,148,153,158,163,168],{"text":134,"config":135},"CICD",{"href":136,"dataGaName":137,"dataGaLocation":41},"/topics/ci-cd/","cicd",{"text":139,"config":140},"GitOps",{"href":141,"dataGaName":142,"dataGaLocation":41},"/topics/gitops/","gitops",{"text":144,"config":145},"DevOps",{"href":146,"dataGaName":147,"dataGaLocation":41},"/topics/devops/","devops",{"text":149,"config":150},"Version Control",{"href":151,"dataGaName":152,"dataGaLocation":41},"/topics/version-control/","version control",{"text":154,"config":155},"DevSecOps",{"href":156,"dataGaName":157,"dataGaLocation":41},"/topics/devsecops/","devsecops",{"text":159,"config":160},"Cloud Native",{"href":161,"dataGaName":162,"dataGaLocation":41},"/topics/cloud-native/","cloud native",{"text":164,"config":165},"AI for Coding",{"href":166,"dataGaName":167,"dataGaLocation":41},"/topics/devops/ai-for-coding/","ai for coding",{"text":169,"config":170},"Agentic AI",{"href":171,"dataGaName":172,"dataGaLocation":41},"/topics/agentic-ai/","agentic ai",{"title":174,"links":175},"Solutions",[176,180,185,190,195,199,204,207,212,217,222,227],{"text":177,"config":178},"Application Security Testing",{"href":179,"dataGaName":177,"dataGaLocation":41},"/solutions/application-security-testing/",{"text":181,"config":182},"Automated software delivery",{"href":183,"dataGaName":184,"dataGaLocation":41},"/solutions/delivery-automation/","automated software delivery",{"text":186,"config":187},"Agile development",{"href":188,"dataGaName":189,"dataGaLocation":41},"/solutions/agile-delivery/","agile delivery",{"text":191,"config":192},"SCM",{"href":193,"dataGaName":194,"dataGaLocation":41},"/solutions/source-code-management/","source code management",{"text":134,"config":196},{"href":197,"dataGaName":198,"dataGaLocation":41},"/solutions/continuous-integration/","continuous integration & delivery",{"text":200,"config":201},"Value stream management",{"href":202,"dataGaName":203,"dataGaLocation":41},"/solutions/value-stream-management/","value stream management",{"text":139,"config":205},{"href":206,"dataGaName":142,"dataGaLocation":41},"/solutions/gitops/",{"text":208,"config":209},"Enterprise",{"href":210,"dataGaName":211,"dataGaLocation":41},"/enterprise/","enterprise",{"text":213,"config":214},"Small business",{"href":215,"dataGaName":216,"dataGaLocation":41},"/small-business/","small business",{"text":218,"config":219},"Public sector",{"href":220,"dataGaName":221,"dataGaLocation":41},"/solutions/public-sector/","public sector",{"text":223,"config":224},"Education",{"href":225,"dataGaName":226,"dataGaLocation":41},"/solutions/education/","education",{"text":228,"config":229},"Financial services",{"href":230,"dataGaName":231,"dataGaLocation":41},"/solutions/finance/","financial services",{"title":233,"links":234},"Resources",[235,240,245,250,255,260,265,270,275,280,285,290,295],{"text":236,"config":237},"Install",{"href":238,"dataGaName":239,"dataGaLocation":41},"/install/","install",{"text":241,"config":242},"Quick start guides",{"href":243,"dataGaName":244,"dataGaLocation":41},"/get-started/","quick setup checklists",{"text":246,"config":247},"Learn",{"href":248,"dataGaName":249,"dataGaLocation":41},"https://university.gitlab.com/","learn",{"text":251,"config":252},"Product documentation",{"href":253,"dataGaName":254,"dataGaLocation":41},"https://docs.gitlab.com/","docs",{"text":256,"config":257},"Blog",{"href":258,"dataGaName":259,"dataGaLocation":41},"/blog/","blog",{"text":261,"config":262},"Customer success stories",{"href":263,"dataGaName":264,"dataGaLocation":41},"/customers/","customer success stories",{"text":266,"config":267},"Remote",{"href":268,"dataGaName":269,"dataGaLocation":41},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":271,"config":272},"GitLab Services",{"href":273,"dataGaName":274,"dataGaLocation":41},"/services/","services",{"text":276,"config":277},"TeamOps",{"href":278,"dataGaName":279,"dataGaLocation":41},"/teamops/","teamops",{"text":281,"config":282},"Community",{"href":283,"dataGaName":284,"dataGaLocation":41},"/community/","community",{"text":286,"config":287},"Forum",{"href":288,"dataGaName":289,"dataGaLocation":41},"https://forum.gitlab.com/","forum",{"text":291,"config":292},"Events",{"href":293,"dataGaName":294,"dataGaLocation":41},"/events/","events",{"text":296,"config":297},"Partners",{"href":298,"dataGaName":299,"dataGaLocation":41},"/partners/","partners",{"title":301,"links":302},"Company",[303,308,313,318,323,328,333,337,342,347,352,357],{"text":304,"config":305},"About",{"href":306,"dataGaName":307,"dataGaLocation":41},"/company/","company",{"text":309,"config":310},"Jobs",{"href":311,"dataGaName":312,"dataGaLocation":41},"/jobs/","jobs",{"text":314,"config":315},"Leadership",{"href":316,"dataGaName":317,"dataGaLocation":41},"/company/team/e-group/","leadership",{"text":319,"config":320},"Team",{"href":321,"dataGaName":322,"dataGaLocation":41},"/company/team/","team",{"text":324,"config":325},"Handbook",{"href":326,"dataGaName":327,"dataGaLocation":41},"https://handbook.gitlab.com/","handbook",{"text":329,"config":330},"Investor relations",{"href":331,"dataGaName":332,"dataGaLocation":41},"https://ir.gitlab.com/","investor relations",{"text":334,"config":335},"Sustainability",{"href":336,"dataGaName":334,"dataGaLocation":41},"/sustainability/",{"text":338,"config":339},"Diversity, inclusion and belonging (DIB)",{"href":340,"dataGaName":341,"dataGaLocation":41},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":343,"config":344},"Trust Center",{"href":345,"dataGaName":346,"dataGaLocation":41},"/security/","trust center",{"text":348,"config":349},"Newsletter",{"href":350,"dataGaName":351,"dataGaLocation":41},"/company/contact/","newsletter",{"text":353,"config":354},"Press",{"href":355,"dataGaName":356,"dataGaLocation":41},"/press/","press",{"text":358,"config":359},"Modern Slavery Transparency Statement",{"href":360,"dataGaName":361,"dataGaLocation":41},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"items":363},[364,366,368],{"text":101,"config":365},{"href":103,"dataGaName":104,"dataGaLocation":41},{"text":106,"config":367},{"href":108,"dataGaName":109,"dataGaLocation":41},{"text":111,"config":369},{"dataGaName":113,"dataGaLocation":41,"id":114,"isOneTrustButton":115},"content:shared:en-us:main-footer.yml","Main Footer","shared/en-us/main-footer.yml","shared/en-us/main-footer",{"_path":375,"_dir":376,"_draft":6,"_partial":6,"_locale":7,"visibility":115,"id":377,"title":378,"button":379,"_id":383,"_type":26,"_source":27,"_file":384,"_stem":385,"_extension":30},"/shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":380,"text":382},{"href":381},"/software-innovation-report/","Get the research report","content:shared:en-us:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":387,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"logo":388,"subscribeLink":393,"navItems":397,"_id":410,"_type":26,"title":411,"_source":27,"_file":412,"_stem":413,"_extension":30},"/shared/en-us/the-source/navigation",{"altText":389,"config":390},"the source logo",{"src":391,"href":392},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/the-source/",{"text":394,"config":395},"Subscribe",{"href":396},"#subscribe",[398,402,406],{"text":399,"config":400},"Artificial Intelligence",{"href":401},"/the-source/ai/",{"text":403,"config":404},"Security & Compliance",{"href":405},"/the-source/security/",{"text":407,"config":408},"Platform & Infrastructure",{"href":409},"/the-source/platform/","content:shared:en-us:the-source:navigation.yml","Navigation","shared/en-us/the-source/navigation.yml","shared/en-us/the-source/navigation",{"_path":415,"_dir":11,"_draft":6,"_partial":6,"_locale":7,"title":416,"description":417,"submitMessage":418,"formData":419,"_id":422,"_type":26,"_source":27,"_file":423,"_stem":424,"_extension":30},"/shared/en-us/the-source/newsletter","The Source Newsletter","Stay updated with insights for the future of software development.","You have successfully signed up for The Source’s newsletter.",{"config":420},{"formId":421,"formName":351,"hideRequiredLabel":115},1077,"content:shared:en-us:the-source:newsletter.yml","shared/en-us/the-source/newsletter.yml","shared/en-us/the-source/newsletter",{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"type":8,"slug":9,"config":426,"seo":427,"content":429,"_id":25,"_type":26,"title":14,"_source":27,"_file":28,"_stem":29,"_extension":30},{"layout":11},{"config":428,"title":14},{"noIndex":6},[430,434],{"type":17,"componentName":17,"componentContent":431},{"name":14,"role":19,"headshot":432},{"altText":14,"config":433},{"src":22},{"type":24,"componentName":24},{"amanda-rueda":436,"andre-michael-braun":437,"andrew-haschka":438,"ayoub-fandi":439,"bob-stevens":440,"brian-wald":441,"bryan-ross":442,"chandler-gibbons":443,"dave-steer":444,"ddesanto":445,"derek-debellis":446,"emilio-salvador":447,"erika-feldman":448,"george-kichukov":449,"gitlab":450,"grant-hickman":451,"haim-snir":452,"iganbaruch":453,"jason-morgan":454,"jessie-young":455,"jlongo":456,"joel-krooswyk":457,"josh-lemos":458,"julie-griffin":459,"kristina-weis":460,"lee-faus":461,"nathen-harvey":462,"ncregan":463,"rob-smith":14,"rschulman":464,"sabrina-farmer":465,"sandra-gittlen":466,"sharon-gaudin":467,"stephen-walters":468,"taylor-mccaslin":469},"Amanda Rueda","Andre Michael Braun","Andrew Haschka","Ayoub Fandi","Bob Stevens","Brian Wald","Bryan Ross","Chandler Gibbons","Dave Steer","David DeSanto","Derek DeBellis","Emilio Salvador","Erika Feldman","George Kichukov","GitLab","Grant Hickman","Haim Snir","Itzik Gan Baruch","Jason Morgan","Jessie Young","Joseph Longo","Joel Krooswyk","Josh Lemos","Julie Griffin","Kristina Weis","Lee Faus","Nathen Harvey","Niall Cregan","Robin Schulman","Sabrina Farmer","Sandra Gittlen","Sharon Gaudin","Stephen Walters","Taylor McCaslin",{"ai":399,"platform":407,"security":403},[472],{"_path":473,"_dir":474,"_draft":6,"_partial":6,"_locale":7,"slug":475,"type":476,"category":474,"config":477,"seo":480,"content":485,"_id":509,"_type":26,"title":483,"_source":27,"_file":510,"_stem":511,"_extension":30,"description":484,"date":486,"timeToRead":487,"heroImage":482,"keyTakeaways":488,"articleBody":492,"faq":493},"/en-us/the-source/ai/securing-federal-ai-from-legacy-systems-to-innovation","ai","securing-federal-ai-from-legacy-systems-to-innovation","article",{"layout":11,"template":478,"featured":6,"author":9,"sourceCTA":479,"isHighlighted":6,"authorName":14},"TheSourceArticle","source-lp-ai-powered-efficiency-modernizing-government-in-2025",{"config":481,"ogImage":482,"title":483,"description":484},{"noIndex":6},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1752687563/vda4ouljcsv1z63bvs2p.png","Securing federal AI: From legacy systems to innovation","Explore how federal agencies can balance AI innovation with cybersecurity as traditional security measures fail to keep pace with rapid AI development cycles.",{"title":483,"description":484,"date":486,"timeToRead":487,"heroImage":482,"keyTakeaways":488,"articleBody":492,"faq":493},"2025-10-16","5 min read",[489,490,491],"Federal agencies face expanding cyber threats as AI accelerates code development faster than traditional security frameworks can handle.","Legacy government systems create security blind spots that multiply exponentially when combined with AI-generated code dependencies.","Successful AI adoption requires platform-embedded governance that scales automatically with development velocity while maintaining security.","As artificial intelligence reshapes the public sector landscape, government organizations must navigate between extraordinary possibilities and serious security risks. The ways the public sector implements AI today will set the stage for future technological progress.\n\nSoftware development stands at the center of this transformation. As government departments embrace AI's game-changing capabilities, they're discovering that it creates code much faster than existing security systems can review it. This speed creates a massive expansion in potential attack points across federal networks.\n\n## The cybersecurity challenge for government\nRecent research reveals the magnitude of security challenges confronting federal agencies. [GitLab's 2025 executive research report, “The Economics of Software Innovation: $750B+ Opportunity at a Crossroads,”](https://about.gitlab.com/software-innovation-report/) found that 85% of senior leaders believe AI will bring unprecedented security risks, with 52% naming cybersecurity threats as their top concern.\n\nThe threat landscape is growing at a concerning pace. Security experts predict that researchers and organizations will identify nearly 50,000 new common vulnerabilities and exposures (CVEs) this year. AI systems create more code and add dependencies across government networks, causing these security gaps to multiply rapidly.\n\n[Outdated systems and code throughout government operations](https://about.gitlab.com/the-source/ai/transform-legacy-systems-faster-with-ai-automation-tools/) exacerbate the problem. Federal technology infrastructure depends heavily on aging frameworks and programming languages that lack modern security features. These older systems often can't work with current security scanning tools, creating dangerous gaps that criminals can target.\n\nPerhaps most concerning for national security is the shrinking window between vulnerability disclosure and exploitation. Current [data shows](https://www.vulncheck.com/blog/exploitation-trends-q1-2025) that hackers exploit more than 28% of security flaws within 24 hours of disclosure. Federal agencies can't continue using slow, traditional response methods.\n\n## Strengthening government software supply chains\nFederal agencies face challenges that go beyond standard cybersecurity to include software supply chain protection. When AI generates code across multiple storage locations at once, basic questions about what systems exist, how they work, and where risks concentrate become much harder to answer.\n\nThis visibility problem requires a comprehensive approach that progresses from discovery to monitoring to response. To maintain clear visibility across software supply chains, agencies should implement:\n\n**Complete asset tracking:** Government departments must keep detailed records of all software components, including a comprehensive software bill of materials (SBOM) that shows exactly which third-party and open-source components they use.\n\n**Agency-wide risk assessment:** Security can't stay isolated within single programs or offices. Teams need shared dashboards to understand what's protected, find missing coverage, and respond quickly, especially with AI speeding up development across entire agencies.\n\n**Ongoing threat surveillance:** Continuous security scanning fills critical holes by automatically watching code storage areas and checking existing SBOMs against newly published CVEs. This approach proves especially valuable in AI-accelerated environments, where automatic code creation can build large codebases that teams might neglect later.\n\n**Targeted problem-solving:** Code that gets pulled in automatically from other libraries often makes up most of an application's total code. When security flaws appear in complicated dependency chains, teams can't see how vulnerable packages were introduced through multiple layers. Dependency tracking shows the complete path from main dependencies to flawed packages, helping teams quickly find the right solutions.\n\nThese supply chain security steps provide important visibility and control, but they're only part of the answer. The biggest challenge for federal agencies remains scaling these security practices to match the velocity of AI-driven development while also addressing vulnerabilities inherited from decades of legacy systems.\n\n## Secure governance for AI-powered development\nFederal agencies must modernize legacy codebases while building governance frameworks that can scale with AI-driven development cycles. Traditional security governance relies on manual checking and periodic reviews that can't address either challenge. This situation requires proactive, platform-embedded governance that can address both legacy vulnerabilities and AI-accelerated development.\n\nTo ensure comprehensive protection, the core principles of secure AI development must [extend across the entire software development lifecycle](https://about.gitlab.com/the-source/security/embedding-risk-intelligence-into-your-software-supply-chain/). These platform-native controls ensure security governance scales automatically with development speed, enabling federal agencies to build faster with AI without sacrificing enterprise security needs.\n\nFor agencies managing sensitive national security data, these governance frameworks must work entirely within agency-controlled environments, whether in classified facilities, private clouds, or highly regulated spaces. This approach allows agencies to use AI-powered development tools while maintaining complete control over their data.\n\nBy building these governance principles directly into their development platforms, federal agencies can ensure [security scales automatically with AI-accelerated development](https://about.gitlab.com/the-source/security/compliance-at-the-speed-of-ai-reimagining-grc/), removing the traditional trade-off between speed and security.\n\n## Leading through secure innovation\nFederal agencies face a critical decision point. Moving forward requires secure, compliant systems that enable organizations to harness AI's complete potential.\n\nWith 94% of organizations seeing return on investment from AI within two years, there's no time to delay. By creating secure and ethical AI deployments, government agencies can set standards and gain a lasting competitive advantage. The future of technological leadership, in both public and private sectors, depends on successfully finding this balance.",[494,497,500,503,506],{"header":495,"content":496},"What are the main cybersecurity challenges federal agencies face with AI implementation?","AI systems create code much faster than existing security systems can review it, causing massive expansion in potential attack points across federal networks. Researchers predict nearly 50,000 new CVEs this year, with AI creating more code and adding dependencies that multiply security gaps. Hackers exploit over 28% of security flaws within 24 hours of disclosure, making traditional slow response methods inadequate.",{"header":498,"content":499},"How do legacy systems complicate AI security for government agencies?","Federal technology infrastructure depends heavily on aging frameworks and programming languages that lack modern security features. These older systems often can't work with current security scanning tools, creating dangerous gaps that criminals can target. Outdated systems and code throughout government operations exacerbate security problems as AI accelerates development.",{"header":501,"content":502},"What four steps should agencies implement to strengthen software supply chain security?","Agencies should implement complete asset tracking with detailed records and comprehensive software bill of materials showing third-party and open-source components, agency-wide risk assessment through shared dashboards for understanding protection and coverage, ongoing threat surveillance with continuous security scanning checking SBOMs against newly published CVEs, and targeted problem-solving through dependency tracking showing complete paths to flawed packages.",{"header":504,"content":505},"How should federal agencies approach governance for AI-powered development?","Agencies must build governance frameworks that scale with AI-driven development cycles through proactive platform-embedded governance rather than manual checking and periodic reviews. These platform-native controls ensure security governance scales automatically with development speed, working entirely within agency-controlled environments like classified facilities, private clouds, or highly regulated spaces for sensitive national security data.",{"header":507,"content":508},"Why is the window between vulnerability disclosure and exploitation critical for federal agencies?","Current data shows hackers exploit over 28% of security flaws within 24 hours of disclosure. Federal agencies can't continue using slow traditional response methods when exploitation happens so quickly. This shrinking window between disclosure and exploitation creates an urgent need for automated continuous security scanning and rapid response capabilities.","content:en-us:the-source:ai:securing-federal-ai-from-legacy-systems-to-innovation.yml","en-us/the-source/ai/securing-federal-ai-from-legacy-systems-to-innovation.yml","en-us/the-source/ai/securing-federal-ai-from-legacy-systems-to-innovation",1761814447253]