By treating a cybersecurity breach like a crime investigation, federal IT leaders can ensure a speedy response and aid in prosecution.
The National Information Exchange Model's usefulness extends far beyond its origins in justice and law enforcement.
A recent GAO report on government efforts to link small companies with prime contractors is fraught with risk.
Now that all the major smartphone platforms offer mobile payment options, federal agencies need to join the trend
Automation and the orchestration of multiple systems are essential to defending against today's cyber threats, which requires a new approach to security operations centers.
A new study helps vendors understand what messages resonate (and tells feds how their peers prefer to be pitched).
Nominations for the 2015 awards are open until Dec. 23.
Agency leaders must proactively invest time, energy and resources to shape the future rather than reactively wait for change to happen.
A HealthCare.gov gears up again for open enrollment, there are lessons to be learned for future system roll-outs.
IT professionals can create security and access models that transform APIs from unwieldy legacy apps to self-defending services.
High-performing security teams look very different today than they did a decade ago, but too many agencies have paid insufficient attention to attracting and developing the right talent.
FCW Editor-in-Chief Troy Schneider shares five points to remember when submitting nominations for the 2015 Federal 100 awards.