Anthropic Launches Project Glasswing AI Cybersecurity Initiative

Federal News

Anthropic Launches Project Glasswing AI Cybersecurity Initiative

🔒 Cybersecurity 🤖 Artificial Intelligence 💻 Information Technology 🛡️ Defense & Military

Anthropic has launched Project Glasswing in April 2026, an AI-driven cybersecurity initiative partnering with major technology companies including Amazon, Microsoft, Apple, Google, Nvidia, CrowdStrike, Palo Alto Networks, and Cisco. The project deploys Anthropic's advanced AI model, Claude Mythos Preview, to proactively identify and remediate critical software vulnerabilities, particularly in open-source software and foundational systems. This initiative includes a $100 million usage credit commitment and $4 million in donations to open-source security groups, aiming to strengthen cyber defense capabilities amid rising AI-powered cyber threats. The effort also involves collaboration with U.S. federal agencies and has raised discussions within the U.S. intelligence community about balancing AI-enabled defensive and offensive cyber operations.

  • Why this matters: Project Glasswing represents a significant public-private partnership leveraging AI to enhance cybersecurity resilience, offering procurement professionals opportunities to engage with advanced AI cybersecurity tools and services.
  • The initiative's focus on open-source software vulnerabilities highlights growing government and industry emphasis on securing foundational digital infrastructure.
  • Agencies and contractors should evaluate integration possibilities of AI-driven vulnerability detection and remediation technologies to meet evolving cybersecurity requirements.
  • The involvement of leading tech firms and federal entities signals potential future procurement opportunities for AI-enabled cybersecurity solutions and collaborative defense frameworks.

By prioritizing defensive access to these powerful capabilities, Anthropic is helping us ensure that while intelligence is being weaponized, the defenders are the ones with the superior stack. AI becomes the defender.

— Nikesh Arora, CEO of Palo Alto Networks

Cyber defense at this scale is a team effort. Frontier labs, software companies, security researchers, open-source maintainers, and governments all working together is how defenders will stay ahead.

— Daniela Amodei, President of Anthropic

Mythos Preview had found thousands of major vulnerabilities in operating systems, web browsers and other software.

— Anthropic

Agencies

Department of Defense, Cybersecurity and Infrastructure Security Agency, National Institute of Standards and Technology’s Center for AI Standards and Innovation, National Security Agency, U.S. Cyber Command

Vendors

Anthropic, Amazon, Microsoft, Apple, Google

Contracts

Locations

Sources

State & Local Analysis

Industry Leaders Advocate AI-Driven Cybersecurity

🔒 Cybersecurity 🤖 Artificial Intelligence 💻 Information Technology

The cybersecurity sector is undergoing a critical transformation as traditional security models prove insufficient against rapidly evolving AI-powered threats. Industry leaders like Jan Lane, President of Visio Cyber AI, and Sudhir Kothari, CEO & MD of Embee Software, emphasize the necessity of adopting AI-led, identity-centric, and integrated security frameworks such as Zero Trust Architecture. These approaches enable predictive, adaptive defense mechanisms that continuously protect hybrid IT environments and automate compliance amid intensifying regulatory demands.

  • Procurement professionals should prioritize AI-enabled cybersecurity solutions that offer architectural data transformation and active defense capabilities to counter generative AI threats.
  • Agencies and contractors can leverage platforms that enhance operational efficiency, measurable resilience, and compliance automation, aligning with emerging federal cybersecurity mandates.
  • This shift signals increased demand for vendors specializing in AI-driven security technologies, creating opportunities for prime contractors like Visio Cyber AI.
  • Organizations must evaluate current cybersecurity contracts and strategies to incorporate adaptive, AI-powered defenses that evolve with threat landscapes.

Sources

Federal News

Lazarus Alliance Launches FedRAMP Moderate Equivalency Program

🔒 Cybersecurity ☁️ Cloud Services 💻 Information Technology

Lazarus Alliance has introduced a FedRAMP Moderate Equivalency Program designed to accelerate Cloud Service Providers' (CSPs) entry into defense and federal markets by leveraging existing FedRAMP Moderate authorizations. This program enables CSPs to achieve Moderate impact compliance in as little as 3 to 6 months through targeted delta assessments and automation, reducing the time and cost typically associated with full FedRAMP authorization cycles. Concurrently, InfusionPoints has secured FedRAMP 20x Class C (Moderate) authorization for its XBU40 Platform-as-a-Service on AWS GovCloud, offering a continuous compliance platform that provides real-time, audit-ready security validation to federal agencies and CSPs.

  • Why this matters: These developments signal a shift toward more agile, automation-driven FedRAMP compliance processes that can shorten procurement timelines and lower barriers for CSPs entering federal and defense markets.
  • Procurement professionals should anticipate increased availability of cloud services with continuous compliance capabilities, potentially streamlining contract evaluations and security assessments.
  • CSPs and contractors can leverage these programs to accelerate federal market access and reduce compliance friction, particularly for defense-related cloud deployments.
  • Organizations supporting federal cloud procurements may find new opportunities in compliance automation, delta assessments, and security validation services.

Sources

Federal Event

DARPA STO Hosts Industry Day in Arlington

🤖 Artificial Intelligence 🛡️ Defense & Military

DARPA's Strategic Technology Office (STO) is conducting a SECRET-level in-person Industry Day at the DARPA Conference Center in Arlington, Virginia. This event is designed to engage industry stakeholders by sharing STO's strategic vision, highlighting key problem areas, and introducing Program Managers and technology interests. While no procurement or solicitation will occur during this event, it offers a valuable opportunity for contractors and technology providers to gain insight into STO's priorities and to participate in technical discussions aimed at innovative solutions for national security challenges.

  • Why this matters: Procurement professionals and contractors can leverage this event to better understand DARPA STO's strategic technology focus areas, which may inform future proposal development and partnership strategies.
  • The event facilitates direct interaction with STO Program Managers, enabling early engagement and networking that could influence upcoming solicitations.
  • Organizations should consider aligning their research and development efforts with the technology interests presented to position themselves competitively for future DARPA opportunities.
  • Although no immediate contracts will be awarded, insights gained here can guide long-term business development and innovation planning within the national security technology sector.

Sources

International News

CryptoNext Security Achieves NIST Quantum-Safe Certification

🔒 Cybersecurity 💻 Information Technology

CryptoNext Security has become the first European Union company to receive full NIST Quantum-Safe certification by integrating all three standardized post-quantum cryptographic algorithms into ProvenRun's ProvenHSM hardware security module. This certification validates their crypto-agile hardware solution designed to protect sensitive data against emerging quantum computing threats, marking a significant advancement in quantum-resistant cybersecurity technologies.

  • Why this matters: Federal agencies and contractors involved in cybersecurity and data protection should consider the implications of quantum-safe cryptography as quantum computing capabilities evolve.
  • Organizations managing sensitive or classified information may benefit from adopting certified quantum-resistant hardware modules to future-proof their security architectures.
  • Procurement professionals should evaluate opportunities to incorporate NIST-certified quantum-safe solutions in upcoming cybersecurity contracts and technology refresh initiatives.
  • Vendors offering quantum-safe cryptographic products, like CryptoNext Security and ProvenRun, are positioned to meet emerging government standards and requirements for post-quantum security.

Sources

FAA Addresses Cybersecurity Gaps in Critical Systems

Federal News

FAA Addresses Cybersecurity Gaps in Critical Systems

🔒 Cybersecurity Regulatory Compliance 🚚 Transportation 💻 Information Technology

The Department of Transportation's Office of Inspector General (OIG) released an April 2026 audit revealing that the Federal Aviation Administration (FAA) has not fully implemented required baseline cybersecurity controls for 45 critical National Airspace System (NAS) IT systems. The audit highlights significant vulnerabilities due to outdated security standards, incomplete documentation, and insufficient vulnerability tracking, increasing the risk of cyberattacks on national aviation infrastructure. The FAA acknowledges these deficiencies and commits to addressing the OIG's recommendations by the end of 2026 to enhance cybersecurity protections and transparency.

  • Why this matters: Procurement professionals should anticipate increased FAA investments in cybersecurity solutions, including system upgrades, vulnerability management tools, and compliance services aligned with federal cybersecurity standards.
  • The FAA's commitment to remediate gaps by late 2026 signals upcoming contract opportunities for vendors specializing in cybersecurity risk assessments, system modernization, and documentation management.
  • Organizations supporting aviation IT infrastructure should prepare for stricter security requirements and enhanced oversight as the FAA works to meet congressional mandates and OIG recommendations.
  • This development underscores the importance of aligning proposals with NIST cybersecurity frameworks and federal aviation cybersecurity policies to meet FAA procurement expectations.

Sources

Celerium Launches Cybersecurity Platform for Defense Contractors

Federal News

Celerium Launches Cybersecurity Platform for Defense Contractors

🔒 Cybersecurity Regulatory Compliance 🛡️ Defense & Military 💻 Information Technology

Celerium has launched the DIB CyberDome™, a cybersecurity platform designed to help approximately 68,000 small and mid-sized defense contractors meet escalating cyber threats and comply with Department of Defense (DoD) requirements, particularly CMMC Level 2. The platform offers automated, adaptive defense capabilities that reduce operational complexity and cost, enabling rapid deployment and continuous threat detection. The Cyber Interceptor component became available in April 2026, with early access to the Elevated Defense System planned for July 2026. Concurrently, DARPA is advancing the TurboFCL tool to streamline facility clearance applications, reflecting a broader federal emphasis on enhancing cybersecurity and security clearances within the defense supply chain.

  • Why this matters: This platform addresses a critical gap for smaller defense contractors struggling with complex and costly cybersecurity compliance, potentially improving the overall security posture of the Defense Industrial Base (DIB).
  • Procurement professionals should note the availability of scalable cybersecurity solutions tailored to CMMC Level 2 compliance, which may influence contract requirements and vendor evaluations.
  • Contractors can leverage the DIB CyberDome to reduce compliance costs and operational burdens while enhancing threat detection capabilities.
  • The ongoing development of TurboFCL by DARPA signals future improvements in facility clearance processes, which may impact contractor onboarding and security eligibility timelines.

Sources

Federal Agencies Implement AI Risk Management

Federal News

Federal Agencies Implement AI Risk Management

☁️ Cloud Services 🤖 Artificial Intelligence 🌐 Digital Infrastructure 🔒 Cybersecurity Regulatory Compliance 💻 Information Technology 🛡️ Defense & Military

Federal agencies have faced a critical April 3, 2026 deadline to implement AI risk management practices for high-impact AI use cases, with compliance varying across departments. Agencies such as the Department of Labor, NASA, and the Department of Veterans Affairs have met or are nearing compliance, while others including the Department of Homeland Security and Department of Transportation have yet to fully comply or publicly update on their status. Concurrently, federal leaders emphasize that successful AI adoption depends on prioritizing mission outcomes over technology hype, addressing legacy IT infrastructure challenges, workforce skill gaps, and governance issues. Experts highlight the necessity of investing in sovereign, modern, and scalable digital infrastructure capable of supporting secure AI operations across hybrid and multi-cloud environments to enable responsible AI deployment. These developments underscore the importance of aligning AI governance with technical realities and infrastructure modernization to achieve effective and secure AI integration in federal operations.

  • Why this matters: Procurement professionals should recognize the growing demand for modern, sovereign digital infrastructure and AI risk management solutions that comply with federal mandates.
  • Agencies are prioritizing investments in scalable data platforms and hybrid cloud environments to support AI capabilities, creating opportunities for vendors specializing in secure, compliant infrastructure.
  • Organizations should evaluate workforce readiness and training services as agencies address skill shortages critical to AI scaling.
  • Compliance with AI risk management requirements is becoming a procurement criterion, influencing contract awards and vendor selection in federal AI initiatives.

Sources

Telos Achieves FedRAMP High Authorization for Xacta Platform

Federal News

Telos Achieves FedRAMP High Authorization for Xacta Platform

🔒 Cybersecurity ☁️ Cloud Services 🤖 Artificial Intelligence 💻 Information Technology 🛡️ Defense & Military

Telos Corporation has achieved full FedRAMP Impact Level High authorization for its Xacta Cyber Governance, Risk, and Compliance (GRC) platform, including the AI-enhanced Xacta.io and Xacta.ai modules, as of April 9, 2026. This certification enables federal agencies to deploy Telos' platform in mission-critical environments handling highly sensitive data, supporting enhanced continuous monitoring, AI-driven compliance automation, and risk management. The authorization strengthens Telos' position as a prime contractor for federal cybersecurity solutions, including a recent $3.7 million Air Force contract option awarded in June 2025 for Xacta GRC access.

  • Why this matters: Federal procurement professionals can now consider Telos' FedRAMP High authorized Xacta platform for secure cloud governance and compliance in sensitive environments.
  • The AI capabilities in Xacta.io and Xacta.ai offer advanced automation and risk insights, aligning with federal agencies' increasing demand for AI-driven cybersecurity tools.
  • Contractors and vendors should evaluate opportunities to support or integrate with Telos' platform, especially within Air Force and other defense-related procurements.
  • Organizations managing federal cloud services must prioritize solutions with FedRAMP High authorization to meet stringent security requirements for sensitive data handling.

Sources

Federal Event

CDC Seeks Industry Input for RISER Program

🚑 Emergency Response 🏥 Healthcare

The Centers for Disease Control and Prevention (CDC) is conducting a virtual Industry Day to engage stakeholders in market research for the Resources for the Improvement of Surveillance and Emergency Response (RISER) program. This initiative aims to procure and manage critical assets including reference pathogens, reagents, secure data infrastructure, and surge capacity to support public health laboratories and emergency response efforts. The program reflects CDC's commitment to strengthening surveillance capabilities and rapid response readiness for public health emergencies.

  • The RISER program involves procurement activities under contract number 75D301-TBD-RISER, focusing on in-vitro diagnostic substances and custom computer programming services (NAICS 325413 and 541511).
  • Procurement professionals should note the emphasis on secure data systems and surge capacity, indicating opportunities for vendors specializing in laboratory reagents, pathogen materials, and IT infrastructure.
  • Industry stakeholders are encouraged to participate in the virtual Industry Day to understand CDC requirements and align their offerings with public health emergency preparedness needs.
  • Contact for registration and inquiries is riseridiq@cdc.gov, with Adam Dwyer as the point of contact at CDC Headquarters in Atlanta, Georgia.

Sources

State & Local News

NJDOL Bars Noncompliant Businesses from Contracting

Regulatory Compliance 💼 Professional Services

The New Jersey Department of Labor and Workforce Development (NJDOL) has updated its Workplace Accountability in Labor List (The WALL) by adding eight businesses with outstanding wage, benefit, and tax law violations. These businesses are now barred from participating in public contracting in New Jersey until they resolve their liabilities. This enforcement action reflects NJDOL's ongoing commitment to protect workers' rights and promote fair competition in public procurement, with a total of 364 businesses currently listed owing $32.9 million in outstanding obligations.

  • Procurement officials in New Jersey should verify vendor status against The WALL to avoid contracting with barred entities.
  • Contractors and subcontractors must ensure compliance with wage, benefit, and tax laws to maintain eligibility for public contracts in New Jersey.
  • This initiative signals increased scrutiny on labor law compliance, impacting bidding strategies and vendor due diligence.
  • Businesses listed on The WALL can contact NJDOL at OSECInquiries@dol.nj.gov for inquiries related to the list and resolution processes.

Sources