abstract image of money

How to manage agency budgets in real time

Here are three steps for moving from static spreadsheets to truly dynamic tools that support decision-making and mission analysis.

National Labs Bechtel training program

NPPD cyber and infrastructure security personnel are side by side

Infrastructure and cybersecurity personnel are now co-located as part of NPPD’s efforts to coordinate cyber and physical threat information.

Shutterstock image (by adhike): hacker over a screen with binary code.

Report: Juniper breach has feds worried

A big breach at computer security firm Juniper Networks has federal officials fearing that foreign spies had access to encrypted communications between the U.S. government and the private sector for the last three years, according to a CNN report.

Shutterstock image (by Mascha Tace): business contract competition, just out of reach.

Protests resolved, GSA launches agile BPA

GSA has resolved protests around its agile Blanket Purchase agreement, added a vendor and can now begin awarding work.

cyber education

A bot named for a 'West Wing' character helps onboard 18F's new hires

18F developed a Slack bot named Dolores Landingham that's helping to ease the transition for new employees.

DOD IG logo

Audit finds Navy installations still vulnerable

Navy officials did not properly tap the National Crime Information Center when screening certain contractors, the IG concluded in a November report that was released in full on Dec. 18.

Shutterstock image: meet and greet silhouettes.

What's coming from FedRAMP, 18F and USAJobs

GSA's Phaedra Chrousos discussed a wide range of possible revamps at a recent gathering of contract professionals.

lock globe and fiber optics

White House sends cyber deterrence policy to Congress

Lawmakers have long asked for such a policy, but the debate is likely only getting started now that they have one.

More collaboration with tech companies needed to counter Islamic State online

The State Department is continuing its efforts to undermine the Islamic State online, now that militants prefer to use private and sometimes encrypted communications rather than public-facing social media.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

DHS cybersecurity office appeals to industry for innovation

DHS looks for industry to help keep up cyber defense programs like Einstein and CDM.

Ashton Carter

Defense chief used personal email for official business

The revelation raises questions about the security of information handled by Defense Secretary Ashton Carter and revives concerns about email security practices in the Obama administration.

Shutterstock image (Orhan Cam): U.S. Capitol at night.

Congress grants the National Labs a FITARA exemption in omnibus

The $1.1 trillion spending bill includes a FITARA carve-out for the National Labs, some key appropriations for IT improvements and cybersecurity, and lumps of coal for a few problematic programs.

FCW in Print

Check out the digital edition of FCW magazine -- the federal IT community's premier publication.

In this issue: Tony Scott's busy year ahead, Rising Star profiles and more.

More from 1105 Public Sector Media Group