The best-laid plan? Experts debate whether the National Strategy to Secure Cyberspace is still relevant — if it ever was
Preventive measures Making software programmers more security-minded from the start can reduce costs and headaches later on
Lights out Taking down part of the country’s fiber-optic network could be a crippling blow, but is it so easily done?
Emergency war spending bill sacrifices IT
Bush shifts technology funds to border security
IWN moves to second phase
Williams, Doan get high marks at the start
Editorial: Security: The VA’s reminder Mistakes such as the recent theft of Department of Veterans Affairs data have consequences -- both good and bad.
Swire: Is data retention secure?
McFarland confident about VA changes
Former CIO says recent data theft highlights need to transform internal IT governance
NOAA responds to IG's censure
Encryption from the database to the laptop PC
Vendor initiatives abound for securing sensitive data
Quick look: Itronix goes semirugged
Contractors seek edge by hiring former feds
Feds’ knowledge of acquisition regs considered a big plus
VA data theft sparks marketing blitz
COOP policies lack leadership
Policy-makers push telework to the center of business continuity planning
Safety Act rule improves process
Lost conference costs more than dollars
Web tech could aid electronic health record push
Alliant contracts move ahead
Teresa Takai’s 10 tips for change
E-Mail this page
Check out the digital edition of FCW magazine -- the federal IT community's premier publication.
In this issue: Profiles of every Fed 100 winner, the government and industry Eagle Award winners and more.
See the latest issue
A revamped assessment process targets the cloud security program’s biggest friction point: time.
FCW talked with FedRAMP evangelist Ashley Mahan about her role in helping agencies adopt cloud technology.
One tiny team is at the center of the federal government’s push for cloud computing — and all the loud, complicated competing interests that go along with it.
Two key IT modernization bills could move in Congress, despite the compressed legislative calendar and the politically charged election year.
CyTech Services, the veteran-owned small business that may have played a significant role in discovering the OPM hack a year ago, says it's never been paid for that work.
Although most agencies are on track to meet a presidential directive to archive email records electronically, a few will need more time.
Limiting the impact of open source policy to a time- and scope-constrained pilot forgoes a unique and long-needed opportunity to modernize government, argues a leading open source advocate.
Agencies can put more money on mission by analyzing accounts payable data. The former leader of the U.K.'s Government Procurement Service explains what it takes.
This year's winners were honored in person at the April 7 Fed 100 Awards Gala. Click here to learn more about their accomplishments.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com