Here are three steps for moving from static spreadsheets to truly dynamic tools that support decision-making and mission analysis.
Infrastructure and cybersecurity personnel are now co-located as part of NPPD’s efforts to coordinate cyber and physical threat information.
A big breach at computer security firm Juniper Networks has federal officials fearing that foreign spies had access to encrypted communications between the U.S. government and the private sector for the last three years, according to a CNN report.
GSA has resolved protests around its agile Blanket Purchase agreement, added a vendor and can now begin awarding work.
18F developed a Slack bot named Dolores Landingham that's helping to ease the transition for new employees.
Navy officials did not properly tap the National Crime Information Center when screening certain contractors, the IG concluded in a November report that was released in full on Dec. 18.
GSA's Phaedra Chrousos discussed a wide range of possible revamps at a recent gathering of contract professionals.
Lawmakers have long asked for such a policy, but the debate is likely only getting started now that they have one.
The State Department is continuing its efforts to undermine the Islamic State online, now that militants prefer to use private and sometimes encrypted communications rather than public-facing social media.
DHS looks for industry to help keep up cyber defense programs like Einstein and CDM.
The revelation raises questions about the security of information handled by Defense Secretary Ashton Carter and revives concerns about email security practices in the Obama administration.
The $1.1 trillion spending bill includes a FITARA carve-out for the National Labs, some key appropriations for IT improvements and cybersecurity, and lumps of coal for a few problematic programs.