Policy


Major General Brett Williams

Why too many technology solutions fall short

Three groups have competing equities in defense IT acquisition, and learning to balance risk among them is the key to success.

OMB DDM Beth Cobert, testifying before the Senate Homeland Security Committee on Jan. 14, 2014

Cobert: Unified clearance rules are a work in progress

Deputy director says administration is working to "make continuous evaluation a reality."

bills with tight belt

Common-sense techniques to save taxpayer dollars

Basic business concepts such as price transparency can drive big savings. We need to apply them more broadly.

image of man holding mobile device with world map and satellite dish in background

NTIA launches Spectrum.gov

The inventory of agency spectrum shows just how complicated it could be to share bandwidth.

Rear Adm. Robert Day, USCG

DHS girds for fiscal 2016

Homeland Security officials talk priorities and possible pain points as budgets constrict yet again.

photo of Sonny Hashmi

GSA's Hashmi goes to GitHub to talk IT trends and strategies

In an April 11 GitChat, GSA's acting CIO stresses agile development, open source and modular contracts as priorities for his agency.

computers and globe_data sharing

Justice, FTC offer new encouragement for information sharing

A joint policy statement assures companies they can share cyberthreat information without violating antitrust laws.

Sylvia Matthews Burwell - Photo Courtesy of the Walmart Foundation

And who will replace Burwell?

OMB director gets the nod to replace Sebelius, who is resigning from HHS

a man grouping items by shape

GSA moves toward category management

The agency is using its experience with the Federal Strategic Sourcing Initiative to adopt targeted buying practices similar to those used in the private sector.

Sylvia Burwell

OMB seeks more money to tackle IT effectiveness

Budget Director Sylvia Burwell identified three management issues that need to be fixed to help IT procurement.

iStockPhoto / FCW

Justice cancels 7 IT procurements over China links

The Section 516 rule seeks to eliminate IT gear from firms that are responsible for cyberattacks on U.S. companies or have ties to China's military.

man studying data

CDM, before and after

Continuous diagnostics and mitigation will allow agencies to have a clearer view of vulnerability gaps, and could also aid forensic investigators after the fact.