The hack of USIS, and OPM's subsequent decision not to renew the background-check firm's contracts, has cast new light on government-contractor relations. Some legal experts believe the protocols for reporting data breaches are a tangled web.
Key oversight chairmanships will shift in the next Congress, thanks to Republicans' Senate wins and House GOP rules.
Which party wins control of the Senate might be less important to passage of key IT acquisition legislation than how much time is left on the legislative clock.
Specific proposals on hiring will be forthcoming soon, says the Office of Federal Procurement Policy administrator.
IT program managers and system owners will be responsible for ensuring that the systems under their jurisdiction undergo a privacy impact assessment.
A draft document from the National Institute of Standards and Technology aims to improve agencies’ sharing of cyber threat information.
The Science and Technology Directorate will deploy research personnel to DHS components to get a better grip on agency IT needs.
News and notes from around the federal IT community
The consulting service arose from the ongoing challenge of being called in to fix IT projects long after they were funded, scoped and set in motion.
News and notes from around the federal IT community.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
The Pentagon has outlined a military strategy that goes beyond previous doctrine in its focus on offensive cyber operations.