Einstein keeps an eye on agency networks
Voluntary network gateway monitoring program gives DHS a big-picture view of federal cybersecurity
Defeating the dumpster divers
The proliferation of storage media, from thumb drives and cell phones to giant disk arrays, makes secure disposal of decommissioned gear a much trickier task
FCW@20: Reporting on storage, then and now
Buzz of the Week: GSA assists the assistors
DOD is caught in the Web 2.0
Military officials name operational concerns as their reason for blocking popular sites
Another bailout for DSS?
GSA: We’re focusing on assisted services
Editorial: Help acquisition workers
The next administration could save money in the long run by adding procurement executives
Kelman: A public service incentive
Leidinger: Recruit creatively
Stephenson: Government in your hand
Government taps the power of us
Officials turn to blogs and wikis to share information and achieve goals
States move warily on Real ID
Officials still crave funding and firm guidance on nationwide standards for driver’s licenses
GSA to retool e-contracting
Contracting officers say they shun the difficult-to-use eOffer, eMod applications
Feds face new HSPD-12 hurdles
Challenges include upgrading building access controls and issuing cards to contractors
House bill sets higher bar for DHS
E-filing trails 80 percent goal
Election season heats up
The big election for the Industry Advisory Council’s Executive Committee is under way
Buzz of the Week
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!
Make a nomination today
Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.
Department credits a fully deployed computer system with helping make a sizable dent in the department’s disability claims backlog.
A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.
A new report surveys the many different approaches to launching a dedicated innovation shop in government.
Nominations for 2015 are being accepted now through Dec. 23.
The flip side of default data encryption on mobile devices is that a lost or stolen device won't yield up its secrets -- an important feature for many federal employees.
A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.
The latest offering is intended to help agencies speed the process of deploying authorized cloud solutions.
Cartoonist John Klossner on the telltale indicators that not everything is running through the CIO.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com