Opinion


IPv6: An answer to network vulnerabilities?

Never mind the deadline. Agencies have compelling security reasons to switch to IPv6, writes NCP Engineering's Julian Weinberger.

Shutterstock image.

Finding savings in FOIA

An analysis of state-level freedom-of-information requests shows how cost-effective smart open-data efforts can be.

capitol dome and bills

Here we go again

Wasn't last year's budget deal supposed to make appropriations easy?

cybersecurity concept

What it takes to achieve effective cyber defense

Addressing nontechnical challenges could help overcome slow-moving government policies and a compliance-focused culture, writes FireEye's Travis Rosiek.

Paul Rosenzweig

American privacy values vs. European perceptions

As law enforcement and intelligence agencies struggle to balance security against civil liberties, it's important to distinguish caricature from reality.

world map

Cybersecurity: What the U.S. can teach Europe

European countries should take a cue from the U.S. and move from being reactive to proactive when it comes to cybersecurity policies, writes Titania's Edwin Bentley.

Cybersecurity research

How agencies' security efforts can drive economic growth

Government IT can support more than just an agency mission -- physical and cybersecurity alike are critical to economic vitality.

Sue Trombley_Iron Mountain

4 keys to digitizing federal records

A closer partnership between records management and IT leaders will make digitization seamless and foster a more open government.

Shutterstock image.

How IT reform could still pass Congress this year

Precious little time is left for legislative action, but Alan Balutis explains why FITARA and other reform efforts still have a chance.

stylized professionals

Do you know who will follow you?

Editor-in-Chief Troy K. Schneider says agencies could learn from the private sector's approach to succession planning.

Steve Goodrich

3 ways to get more out of the Data Act

An expert in government management and transformation argues more is required of Congress and agencies alike.

threat

Isolate and conquer: Getting past a reliance on layered security

It's time to throw cyberattackers into solitary before they strike, writes Bromium's Simon Crosby.