Editor's Desk

No one is 100 percent secure

You might think a cybersecurity breach that exposed the personal information of 45,000 people to still-unknown computer hackers would cause a furor in the mainstream media. And it probably would have, if those 45,000 individuals had been employees of, say, General Motors, Wal-Mart or Microsoft.

But in this case, the victims were current and former employees of the federal government — the Federal Aviation Administration, to be precise — and so the media apparently largely relegated them to the status of nameless, faceless bureaucrats. No news value there, I guess. Too bad, because they deserve better.

Where are Geraldo Rivera and Lou Dobbs when you need them?

This week’s cover story by staff writers Mary Mosquera and Ben Bain doesn’t tell those individual stories. That’s not really this magazine’s turf. But their reporting does highlight the noble efforts of the information security teams at FAA and other agencies in working to secure some of the government’s most precious assets: the information it stores away in cyber vaults.

FAA, in fact, had just been recognized by White House overseers for the exemplary job it had been doing in protecting data in its computer systems when agency officials discovered the breach in their own backyard. Which goes to show that even the best fortified firewalls remain vulnerable. (Page 10)

Also in this issue, staff writer Doug Beizer examines the elusive notion of enterprise architecture and what it takes to make it work. His case study is Recreation.gov, a one-stop vacation-planning shop built by the Interior Department that incorporates recreational land information from several different agencies spread across the federal government. (Page 39)

Alice Lipowicz, who has been bird-dogging the stimulus package through Congress since its inception just a few weeks ago, now gives special attention to the next chapter of this economic recovery saga: where the money goes. The Obama administration has launched a new Web site, Recovery.gov, that is supposed to track the dollar flow from this $787 billion bonanza, but as Alice reports, there is an inherent flaw in the system: Just when speed and focus are of the essence, it’s going to take considerable time and energy to make the various and sundry financial reporting systems compatible. And so the Obama byword, transparency, might be less than it appears. (Page 36)

Transparency and collaboration are the topics that social-media expert Mark Drapeau takes up in a column on the new cadre of federal employees who are using social software to network with one another and with the public at large. He calls them the “goverati.” (Page 19)

End Note: Federal Computer Week has just released the winners of the Federal 100 awards, which honor public- and private-sector information technology professionals who made outstanding contributions to the government IT community in 2008. We will dedicate the March 23 issue to profiling these worthy recipients. But you can find a list of the honorees now on www.fcw.com.

About the Author

David Rapp is editor-in-chief of Federal Computer Week and VP of content for 1105 Government Information Group.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above