Federal Computer Week convened a virtual roundtable with three telework program managers that run some of the most successful programs in government to find out what works with new telework programs — along with the major remaining stumbling blocks.
Facebook and Twitter make it possible for government agencies to communicate and interact with the public in ways not possible just two years ago. But these social media tools also create new types of security risks that agencies must anticipate and plan for.
Support is growing for proposals to give the Federal Energy Regulatory Commission additional authority to act during an emergency involving a cyberattack on the country's electric power system.
The Federal Energy Regulatory Commission said cybersecurity is among its priorities for standards being developed for the country's next-generation, technology-enabled electric grid.
Bills pending in the House and Senate would create inventories of RF spectrum managed by the NTIA and FCC, along with a Web portal to make the information public.
The National Telecommunications and Information Administration wants volunteers to review applications for $4.7 billion in grants for broadband expansion.
The General Services Administration has released a list of 86 federal agencies that have awarded contracts to telecom providers through the Networx contract.
In a recent interview with Federal Computer Week's acquisition editor, Matthew Weigelt, Ed O'Hare, assistant commissioner of the Office of Integrated Technology Services at GSA's Federal Acquisition Service, clarifies and expands upon his comments made during a panel discussion at the Washington Technology Top 100 Conference.
The Census Bureau finished the first phase of the 2010 decennial census ahead of schedule in part because new handheld computers performed well despite earlier problems.
New catalog of information and security controls co-developed by NIST, the Pentagon and the intelligence community, along with information security legislation gaining traction in Congress, are expected to significantly improve federal cybersecurity standards.
Government officials should start now to understand the security implications and begin taking steps to protect their organizations as they adopt the cloud computing model.
A debate rages over a Senate proposal to require certification or licensing for all cybersecurity professionals who work on government information systems.