Policy


Shutterstock image: protected hardware.

Contractors struggle with 'patchwork' of cybersecurity regulations

The hack of USIS, and OPM's subsequent decision not to renew the background-check firm's contracts, has cast new light on government-contractor relations. Some legal experts believe the protocols for reporting data breaches are a tangled web.

Shutterstock image.

Passing the gavels on Capitol Hill

Key oversight chairmanships will shift in the next Congress, thanks to Republicans' Senate wins and House GOP rules.

Shutterstock image.

FITARA supporters ‘optimistic’ about lame duck

Which party wins control of the Senate might be less important to passage of key IT acquisition legislation than how much time is left on the legislative clock.

Anne Rung -- Commerce Department Photo

Rung looks to procurement workforce, collaboration

Specific proposals on hiring will be forthcoming soon, says the Office of Federal Procurement Policy administrator.

privacy keyboard

GSA IT gets privacy impact assessment policy

IT program managers and system owners will be responsible for ensuring that the systems under their jurisdiction undergo a privacy impact assessment.

Shutterstock image: a global system of information relays.

NIST spells out information-sharing best practices

A draft document from the National Institute of Standards and Technology aims to improve agencies’ sharing of cyber threat information.

Dr. Reginald Brothers

DHS to embed researchers 'on the ground'

The Science and Technology Directorate will deploy research personnel to DHS components to get a better grip on agency IT needs.

abstract image of money

Budget forecasts, campaign apps and congressional data centers

News and notes from around the federal IT community

Shutterstock image: illuminated light bulb signifying an innovative idea.

18F to launch consulting group and project dashboard

The consulting service arose from the ongoing challenge of being called in to fix IT projects long after they were funded, scoped and set in motion.

computers and globe_data sharing

Shared services for mapping and a GSA promotion

News and notes from around the federal IT community.

futuristic cyberwar

New cyber doctrine shows more offense, transparency

The Pentagon has outlined a military strategy that goes beyond previous doctrine in its focus on offensive cyber operations.

Complexity (Shutterstock image)

'Computer Chaos' at 20: Back where we started

A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.