VanRoekel's innovation strategy might not be enough to counter the effects of the coming budget cuts. But then again, maybe it will.
To complement the Federal Information Security Management Act, some agencies are adopting a strategy that depends, in part, on a package of 20 security practices, named the Consensus Audit Guidelines.
All of the magazine’s editorial pages that week will be devoted to contributions from readers like you.
It is impossible to manage effectively without the metrics to benchmark and shape performance, writes Robert Otto.
Contractors help the government fill a critical gap, and that gap must be the central focus of any debate on insourcing and managing a blended workforce, writes Jaime Gracia.
The question getting lots of attention in the Government 2.0 space today is: How might crowdsourcing be applied to public participation and government policy-making?
The nature of IT security matters — brought to high alert by episodic breaches and ongoing cyber threats — has raised the stakes and profiles of the government chief information security officer.
In the physics of the workplace, every management action there will be, by definition, an equal and opposite reaction on the part of employees. So what are we to make of the demise of the National Security Personnel System?
The world of federal procurement and acquisition policy is about as insular as it gets in nonclassified government.
The global terrorist threat, brought to U.S. soil on 9/11, has not gone away. And it now includes the ever looming war in cyberspace.
One of the first things that struck me when I arrived here and began meeting people in the technology shops that FCW covers was the number of women in positions of prominence and power.
Government is always trying to play catch-up with technology. And Apps.gov's foray into cloud computing is no different.