Policy


Big Data

Report: Big data, cybersecurity intrinsically linked

Analysts see 'tremendous value' in data the government collects, but say infrastructure and policy prevent making the best use of it.

abstract image of money

Acquisition in the crosshairs amid DOD restructuring

Frank Kendall, the Pentagon undersecretary in charge of acquisition, outlined some tentative plans to streamline acquisition rules, ideally before the fiscal 2015 defense funding bill.

capitol in snow

House passes FITARA (again)

The IT acquisition bill, modified since it first went to the Senate in 2013, was approved by voice vote.

OASIS logo

More than 100 sign OASIS deals

Federal users can choose from among seven pools of providers for professional services offerings, including logistic, IT, engineering, financial management and scientific trades and services.

illustration dollar sign in vise

Hagel outlines looming DOD budget cuts

Cybersecurity is one of a few areas set to receive a boost, at the expense of troop strength.

handshake

In search of a bolder procurement process

Results of a study on barriers to government contracting are expected to be released in early March.

Rep. Darrell Issa

FITARA to get another look in the House

The IT acquisition overhaul bill the House will vote on Tuesday includes a few changes from the version included in the House-passed defense policy measure last year.

concept cybersecurity art

DHS seeks assessment of cybersecurity market for smaller companies

The agency wants to encourage small and midsize businesses to adopt the Cybersecurity Framework.

Global Data (Shutterstock)

Increased disclosure? Or an obstacle for EPA?

Debate over regulatory transparency raises questions of both privacy and process.

Michael Garland

Making the government the market of first resort

Rather than spend time and money adhering to the government's rigid procurement requirements, innovative new companies should have the ability to graduate into compliance.

black box

Report: Government might expand NSA's database

Pending lawsuits could prompt agency to preserve meta data far longer than planned.

Infrastructure

How DHS is helping implement the cyber framework

C3 program will help critical infrastructure operators with readiness and risk management.