Agencies


OMB floats new rules of the road for IT modernization

A draft policy sets out how agencies should prioritize IT modernization efforts.

Shutterstock image: breached lock.

Finalizing cyber incident response might be easier than deciding when to use it

The revised National Cyber Incident Response Plan is on track to be completed by the end of the year, but the more difficult challenge might be determining when a cyber incident reaches a threshold that activates the plan.

Image from Shutterstock.com

Think FedRAMP is a bottleneck? Think again.

The Federal Risk and Authorization Management Program deserves praise, not criticism, and here are four reasons why.

Shutterstock image. Copyright: Lightspring

IT modernization isn't all about tech

More efficient and cost-effective IT often comes down to customer involvement and comfort, according to some IT experts.

Shutterstock image: breached lock.

DDOS attacks raise questions from lawmakers

Lawmakers want answers from government officials and the private sector on how a distributed denial-of-service attack crippled leading websites last week.

Shutterstock image (by R.T. Wohlstadter): blue binary tunnel, fractal illustration.

Data policy for a new administration

Experts have some advice for the next administration on tackling open-data initiatives early in its term to improve government operations and service.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

DOD service chiefs survey the threat landscape

As the Obama administration nears its end, the service secretaries say technological threats will continue to grow and the DOD must reform how it develops systems and its workforce to keep pace with adversaries.

18F logo

18F finances in disarray, watchdog warns

A new report says 18F has lost $36 million to date, "repeatedly overestimated revenue" and pushed back its projected break-even date to 2020.

Shutterstock image: looking for code.

How DOD embraced bug bounties -- and how your agency can, too

Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

Shutterstock image (by Mascha Tace): business contract competition, just out of reach.

GSA streamlines acquisition for small vendors

The GSA has introduced new capabilities and processes under its six-month-old Making It Easier program to attract new potential federal contractors.

Shutterstock image: cyber defense.

Why PPD-41 is evolutionary, not revolutionary

Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

Shutterstock image: data wall.

Commerce taps big-data development partners

The Commerce Department's National Technical Information Service has chosen 35 companies and academic organizations to capitalize on the federal government's vast data assets.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

More from 1105 Public Sector Media Group