Opinion


Shutterstock image: data center lights and hardware.

Modernize and innovate with data virtualization

FITARA brings new requirements for agencies' data management -- but also the opportunity for true transformation.

Shutterstock image: digital fingerprint, cyber crime.

Managing a cyber crime scene

By treating a cybersecurity breach like a crime investigation, federal IT leaders can ensure a speedy response and aid in prosecution.

NIEM: The key to improved information sharing

The National Information Exchange Model's usefulness extends far beyond its origins in justice and law enforcement.

government industry dialog

The government shouldn't play matchmaker

A recent GAO report on government efforts to link small companies with prime contractors is fraught with risk.

Multiple Mobile Devices (Shutterstock)

Federal agencies must prepare for mobile payments

Now that all the major smartphone platforms offer mobile payment options, federal agencies need to join the trend

Shutterstock image: looking for code.

Burning down the legacy SOC

Automation and the orchestration of multiple systems are essential to defending against today's cyber threats, which requires a new approach to security operations centers.

Shutterstock image: executive handshake.

What agencies want to hear when buying IT

A new study helps vendors understand what messages resonate (and tells feds how their peers prefer to be pitched).

Fed 100 logo

Make your Federal 100 nominations today!

Nominations for the 2015 awards are open until Dec. 23.

Shutterstock image.

Preparing for the future of federal IT

Agency leaders must proactively invest time, energy and resources to shape the future rather than reactively wait for change to happen.

Shutterstock image: epic fail stamp.

How to rebound from a large-scale IT failure

A HealthCare.gov gears up again for open enrollment, there are lessons to be learned for future system roll-outs.

Subra Kumaraswamy

How to launch a successful API initiative

IT professionals can create security and access models that transform APIs from unwieldy legacy apps to self-defending services.

Brian Gagnon and Audrey Mickahail_CEB

Building top-notch information security teams

High-performing security teams look very different today than they did a decade ago, but too many agencies have paid insufficient attention to attracting and developing the right talent.

Who's Fed 100-worthy?

Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!