A study by the Ponemon Institute and IBM found the cost per compromised record rose 7 percent in the past year.
A House panel’s version of the annual defense policy measure would authorize increased cyber funding and require the administration to report back to Congress on a range of IT-related issues.
Federal CIO Steven VanRoekel said there is room for "policy and discussions" around expanded agency CIO authorities, but expressed concern that legislation might fail to take into account unforeseen future circumstances.
The Texas Republican tasked with overhauling DOD acquisition talked with FCW about his concerns and priorities.
Steve Kelman reflects on what could be the most important sentence in the Federal Acquisition Regulation.
The White House wants agencies to look for ways to cut discretionary spending, in part to pay for the Opportunity, Growth and Security Initiative the president unveiled in March.
Some requirements in the Enterprise Infrastructure Solutions RFI could "unduly restrict competition," argues the Coalition for Government Procurement's Roger Waldron.
Mary Davie of the Office of Integrated Technology Services says the agency is prepping for a more complex and competitive future.
As agency executives look to implement and reinforce cybersecurity as part of their overall IT and programmatic priorities, an important OMB policy and industry implementation framework can provide context and support by enabling sound IT governance.
The change comes out of the 90-day review of federal privacy rules as they relate to big data.
The Office of Technology Assessment has been unfunded for the better part of 20 years.
A MeriTalk study says another $19.7 billion could be saved through consolidation, virtualization, cloud computing, remote access and infrastructure diversification.
Three-fourths of agency's IT funding would be contingent on Congress getting a granular explanation of the plan for VistA.
Defense Undersecretary Frank Kendall and Sen. Joe Donnelly used an Armed Services Committee hearing to discuss the possibility of using the same cost guidelines for IT and weapons systems.
“Technology alone can't reduce privacy risks,” says computer science professor Susan Graham, one of the authors of a White House report on big data. “There has to be policy as well.”
Meet 100 women and men who are doing great things in federal IT.
Click here for the full list
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com