Unclogging the clearance pipeline
Facing a shortage of workers with security clearances, agencies have been forced to find new ways to deal with the backlog
Disaster pain relievers
6 technologies are transforming government continuity-of-operations plans. Can they help you?
Buzz of the Week
Coast Guard boots lead integratorThe agency's decision to take back control of troubled project could be a bellwether
Partners get ready for IWN
Administration's inaction forces action
Editorial: Relishing the spotlight
Don't blame the IG
Pachter: Please, no more scare talk
DHS pay plan: Deal or no deal
Bill would repeal department’s authorization for a pay-for-performance system
GAO aces recruiting test
Tech outpaces Section 508 standards
In pursuit of consolidation
Michigan’s data centers were vulnerable, but not all managers welcomed consolidation
Clinton assails outsourcing
Presidential contender vows to bring greater accountability to government operations
GSA seeks encryption deal
Can metrics persuade holdouts?
OMB hopes performance measures will make the case for using shared-service providers
The move toward blogging
Energy IG report raises more security concerns
The same new story
Editorials: Submission guidelines
Take the FCW.com poll
E-Mail this page
Nominations are now being accepted for the 2017 Federal 100 Awards.
Submit yours today!
The software whiz behind Pixar's movies Rob Cook surprised even himself by coming out of a "failed retirement" to take a top technology job at the General Services Administration.
FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Help us identify the outstanding women and men in federal IT.
Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.
Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2016 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com