Management


Image from Shutterstock.

To meet new threats, IRS might need an old tool

In the wake of a massive breach, the IRS says it can stay one step ahead with more money -- and a special hiring authority.

Shutterstock image (by Sfio Cracho): businessman running with papers and a briefcase.

GSA agile RFP expected this week

The goal of the proposed blanket purchase agreement would be to decrease software acquisition cycles to less than four weeks.

Shutterstock image: examining computer code.

Modified BPA for CDM coming within 30 days

The crucial next phase of the $6 billion acquisition vehicle will focus on identity management.

Wikimedia image: USAJobs

USAJobs makeover is OPM's summer job this year

OPM plans to address problems with the federal job portal with an agile, continuous delivery approach this summer.

Shutterstock image.

Rethinking acquisition: Addressing the tectonic shift in telecom services

The General Services Administration is working hard to adapt to changing communications needs. Just don't call it a contract.

Shutterstock image (by retrorocket): Cutting red tape.

The urgency behind DOD's acquisition reform efforts

Better Buying Power 3.0 has a geostrategic urgency and emphasis on cybersecurity that was missing from earlier iterations.

Shutterstock image.

Trade automation review, online SBA loans and a CIS retirement

News and notes from around the federal IT community.

Shutterstock image: checking documents.

Focus on EIS transition pushes regional telecom contracts aside

GSA decides to cancel three "bridge" contracts, and says the EIS RFP will slip to September.

USMC Col. Gregory Breazile addressing the audience of the Digital Government Institute

USMC colonel calls for shakeup of cyber structure

Marine Col. Gregory Breazile, director of the Corps' C2/Cyber and Electronic Warfare Integration Division, says HQ "is not functionally aligned to support cyberspace operations."

Shutterstock image (Roman Seliutin): Businessman checking his wallet.

We're paying contractors how much?

GSA's 18F has a new tool aimed at saving money on a huge part of any contract's expense: people.

A cyber RFP re-do, USDA's new web portal, ITES-3S updates and more

News and notes from around the federal IT community.

Shutterstock image: breached lock.

IRS breach highlights weakness of ‘knowledge-based’ security

By answering personal questions, hackers were able to access information for 100,000 taxpayers, revealing how vulnerable the IRS authentication system really is.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.