Policy


Telecom networks abstract

IP switch could threaten FAA systems, says integrator

Harris Corp. has warned that hacking is much less difficult in IP and wireless environments than with hardwired systems, which could prove problematic for air traffic control.

broken lock

'Patchwork' of state laws complicates data breach response

Lawmakers are weighing several options, but disagreements about definitions and regulatory reach could stymie the effort.

computers and globe_data sharing

GAO: Better guidance needed on Computer Matching Act

OMB needs to be more consistent if the law is to achieve its purpose of avoiding waste and duplication, a new report says.

payment made

Obama signs contractor minimum wage order

The executive order will apply only to new federal contracts or contract replacements beginning next year.

cybersecurity concept

Cyber framework promising but may need more

Response has been generally positive, but concerns remain about privacy, incentives and other items not addressed by the framework.

Jenn Allen

Cloud brokers: Stretching the benefits beyond IT

Brokers are becoming an integral part of helping the public sector realize the full benefits of cloud technology.

gold shield on top of computer code

White House unveils cybersecurity framework

The primary targets of the National Institute of Standards and Technology guidelines are the owners and operators of privately run critical infrastructure.

Air Force logo

Air Force looks to shared services for help with IT acquisition

The Air Force is increasingly handling its IT purchasing problems by partnering with other Pentagon agencies and the private sector.

data abstract

Watchdog groups push Senate, White House on Data Act

Organizations as diverse as the Sunlight Foundation and Gun Owners of America want the legislation passed without the changes proposed by OMB.

Bid Protest Trends

About those bid protests...

Are bid protests really booming? Here's the five-year trend -- and an explanation of how the process actually works.

broken lock

NSA cybersecurity issues echo scathing Hill report

A New York Times story on NSA vulnerabilities bears a striking resemblance to a report by Republicans on the Senate Homeland Security and Governmental Affairs Committee detailing problems at other agencies.

abstract head representing big data

ODNI enlists telecoms to find metadata storage solution

A request for information seeks suggestions on how to keep telephone metadata accessible to spy agencies without the government storing it.