The best-laid plan? Experts debate whether the National Strategy to Secure Cyberspace is still relevant — if it ever was
Preventive measures Making software programmers more security-minded from the start can reduce costs and headaches later on
Lights out Taking down part of the country’s fiber-optic network could be a crippling blow, but is it so easily done?
Emergency war spending bill sacrifices IT
Bush shifts technology funds to border security
IWN moves to second phase
Williams, Doan get high marks at the start
Editorial: Security: The VA’s reminder Mistakes such as the recent theft of Department of Veterans Affairs data have consequences -- both good and bad.
Swire: Is data retention secure?
McFarland confident about VA changes
Former CIO says recent data theft highlights need to transform internal IT governance
NOAA responds to IG's censure
Encryption from the database to the laptop PC
Vendor initiatives abound for securing sensitive data
Quick look: Itronix goes semirugged
Contractors seek edge by hiring former feds
Feds’ knowledge of acquisition regs considered a big plus
VA data theft sparks marketing blitz
COOP policies lack leadership
Policy-makers push telework to the center of business continuity planning
Safety Act rule improves process
Lost conference costs more than dollars
Web tech could aid electronic health record push
Alliant contracts move ahead
Teresa Takai’s 10 tips for change
E-Mail this page
Nominations for the 2016 Federal 100 Awards are now being accepted.
Submit your pick today!
With some 14 million letters already out and millions more expected to hit mailboxes by the end of the month, the Office of Personnel Management expects to wrap up notifications to breach victims in the coming weeks.
Steve Kelman continues the conversation on fixing government acquisition.
A governmentwide email retention strategy could have a broad impact on the public and our nation’s history.
Agency CIOs can lead real and lasting change with the help of other government leaders and old-school performance grades.
The Inspector General nominee at the Department of Veterans Affairs told a Senate panel he could institute reform in the short time he'll have on the job.
A reciprocal travel program with 38 participating countries allows for visa-free visits, but a key U.S. senator warns of troubling gaps in the security data.
Antiquated computer systems based on legacy code are a problem for government not just because they are hard to secure, but because it is hard to find people to run them.
Steven Kelman unpacks the argument that social media can negatively affect organizational performance.
GSA's in-house startup tried a reverse auction micro-purchase approach to buying code, and it turned out one techie was willing to work for far cheaper than anyone had imagined.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com