VA climbs out of a hornet's nest
Data security became a top priority at VA in the past year, but officials acknowledge that more work — much more — remains to be done
After the breach, now what?
Would a federal breach notification law bring greater security and sanity to those who find their personal data has been lost or stolen?
When personal data gets out of the box...
A new Federal Computer Week survey finds that the theft of a Veterans Affairs Department laptop PC pushed data security to the forefront at many agencies
Buzz of the Week: GAO's HR reality-check time
DOD cuts back on GovWorks
Effect could severely reduce revenue at Interior's IT assisted services center
Lawmakers want to recharge FISMA
Vendors claim VA contracts unfair
Editorial: The brave new world
Government policy struggles to keep up with advances in technology
Wagner: The wave of the future
Miller: Good government
Kelman: Buying commercial
Petrillo: A failed experiment
OPM sees green on clearances
Officials credit increased oversight for shrinking lengthy clearance times
More feds work on the go
Employee issues worry CFOs
An espresso shot for disc drives
New hybrid hard drives that blend disk and flash memory will appear this fall
DOD reaches first milestone with system's deployment
Denett focuses on FPDS data
Proponents of better federal contracting decry lack of reliable contracting data
Commerce explores hosted e-mail
OMB clarifies HR line of business
New guidance for Human Resources LOB focuses on the application of A-76 rules
Security LOB cleared for takeoff
Feds, industry expand digital partnerships
FCW@20: When we were 10
Buzz of the Week
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com