Agencies


Frank Kendall

Cyber takes center stage in Pentagon's new acquisition guidance

Better Buying Power 3.0 adds cybersecurity to the list of potential trouble spots in weapons, IT and other acquisitions.

Shutterstock image: executive board room.

Good management or measurement make-work?

Goals are good, but reporting requirements can easily get out of hand.

Shutterstock image: cloud network, concept.

Army shifts logistics data to IBM cloud

The Army's move to the on-premise cloud took place over the past year and is based at Army Materiel Command headquarters in Redstone Arsenal, Ala.

Lt. Col. Timothy Kneeland, commander of JBSA

At Joint Base San Antonio, Air Force lags on JRSS

Lt. Col. Timothy Kneeland, commander of Joint Base San Antonio’s 502nd Communications Squadron, says the base’s Air Force component is running behind on a key DOD IT modernization project.

Coast Guardsman using laptop

Coast Guard IT security gaps cited

A DHS IG report said Coast Guard IT remains vulnerable to removable media and email threats.

Wikimedia image: The U.S. Navy variant of the F-35 Joint Strike Fighter, the F-35C, conducts a test flight over the Chesapeake Bay.

Analyzing the F-35, fighting algal blooms and strategic planning at DHS

News and notes from around the federal IT community.

Image of the Pentagon

DOD's IPv6 transition lags

The Pentagon was supposed to wrap up its IPv6 transition in 2012, but an IG report says the effort stalled because IT officials didn't make it a priority.

Heartbleed virus within text

Heartbleed lives, D.C. loses power and the Fed gets high marks

News and notes from around the federal IT community.

analytics concept art

Clearing up confusion about data on nonfederal systems

NIST is seeking comment on the final draft of its guide to handling security for nongovernmental data.

abstract head representing big data

Making big data work

A draft of the NIST Big Data Interoperability Framework looks to establish a common set of definitions for data science.

Shutterstock image: shadowed hacker.

The importance of cyber offense: Sanctions are a good start

Cybercrime is too serious to rely solely on network defenses, Peter Harrell argues.

Shutterstock image: discussing a contract.

A key job opening for category management and wide-open (office) spaces

News and notes from around the federal IT community.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.