The public has repeatedly rebuffed attempts by the federal government to centralize identification management, writes Mike Spinney, senior privacy analyst at the Ponemon Institute.
We are beginning to see increased adoption of tools such as Twitter into more formal roles to help meet agency missions, writes commentator Steve Lunceford.
Federal agencies and departments need to do a better job of using the city of Washington as a recruiting tool to attract young professionals looking for employment, writes Steve Kelman.
To complement the Federal Information Security Management Act, some agencies are adopting a strategy that depends, in part, on a package of 20 security practices, named the Consensus Audit Guidelines.
Agencies need to transition positions without losing institutional knowledge, writes Peter G. Tuttle, CPCM.
The Department of Veterans Affairs' Jan Frye explains the rationale behind VA's Acquisition Academy.
Updating the electrical grid makes sense, but there are still a few bugs to work out, writes FCW columnist Chris Bronk.
Federal regulators should not depend on companies feeding — and perhaps filtering — information to them, writes W. David Stephenson, a Government/Enterprise 2.0 consultant.
Federal managers should combat employees' perceptions that their job is simply to follow the rules, writes FCW columnist Steve Kelman.
Effective cybersecurity requires approaches that look at vulnerability and risk through the dual lenses of technology and policy, writes commentator Chris Bronk.
The program aims to train new contracting professionals to take on work with minimal oversight, writes Harry Hallock, executive director of the Army’s TACOM Contracting Center in Warren, Mich.
Good ideas for improving government contracting need effective oversight to succeed, writes Richard D. Lieberman.