Opinion


Brian Gagnon and Audrey Mickahail_CEB

Building top-notch information security teams

High-performing security teams look very different today than they did a decade ago, but too many agencies have paid insufficient attention to attracting and developing the right talent.

Fed 100 logo

In search of cyber pros (and other IT rock stars)

FCW Editor-in-Chief Troy Schneider shares five points to remember when submitting nominations for the 2015 Federal 100 awards.

Daniel Wilkens.

What feds can learn from political campaigns

Elections are increasingly driven by systems that combine the power of social media and big data to connect with citizens. Those same principles can help agency IT as well.

Shutterstock image.

Why agency IGs are more bark than bite

The obstacles are many, but the Open Standard's Matt Rosenberg argues that database innovations could help build public awareness of IGs' vital work.

Complexity (Shutterstock image)

'Computer Chaos' at 20: Back where we started

A key contributor to Clinger-Cohen argues that federal IT has failed to take advantage of the tools that law provided.

Jean Paoli

Digital government, openness and open cloud -- new cornerstones of democracy

An open cloud -- supporting open source, open standards and interoperability -- can drive innovation and boost citizen participation in government.

Shutterstock image.

Information sharing: Are we safer?

A decade after the 9/11 Commission identified agencies' reluctance to share information as a dangerous shortcoming, the government is moving in the right direction.

Alan Balutis larger version

It's too soon to abandon CIOs

Alan Balutis argues we should let CIOs perform as the Clinger-Cohen Act intended before reinventing the role yet again.

David Elfanbaum

Why large government IT projects fail

We need to end the 'conspiracy of hope' and embrace agile development as the best way to avoid fiascos on the scale of HealthCare.gov, writes Asynchrony's David Elfanbaum.

Richard Spires

Online privacy: It's time for a new security paradigm

Trust management enforces granular privacy, security and organizational policies for gathering and protecting personally identifiable information.

Alan Balutis larger version

8 predictions to put on your calendar

Cisco's Alan Balutis shares his thoughts on what will happen in the coming year.

eye in the sky

Cloud computing under siege

Why advocates of data localization are missing the real security risks.

Who's Fed 100-worthy?

Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!