The Section 516 rule seeks to eliminate IT gear from firms that are responsible for cyberattacks on U.S. companies or have ties to China's military.
The department's inspector general says backup plans for the systems that support workplace as a service are inadequate.
"Where I see failures happening in implementation is when people try to do too much all at one time," says Guidance Software’s Chad McManamy.
The blanket purchase agreements are realizing 24 cents in savings on every dollar spent.
The April 10 release will detail a wide variety of applications available for public use -- albeit in PDF form only for now.
The escalation from medium risk reflects critical back-end tasks that remain incomplete and comes after most consumer-facing problems have been fixed.
CEB research shows that early problem identification and escalation are crucial to project success, yet the warning signs are all too often overlooked.
The transition of the Navy-Marine Corps Intranet to a new government-owned system had been delayed by bid protests and the government shutdown, but
It's easier to recruit an insider than to hack from the outside, warns the former FBI man who had a leading role in catching notorious spy Robert Hanssen.
GAO auditors said that although the Census Bureau has made progress on the IT for the decennial count, several of the supporting projects have neither a schedule nor a detailed plan.
The watchdog agency wants the IRS to provide more and better quantitative information on IT spending to help gauge whether it is getting what it pays for.
The number of federal agency data breaches involving personally identifiable information increased from 10,481 in 2009 to 25,566 in 2013.