Management


Shutterstock image: protected hardware.

First CDM Phase 3 task order hits the street

GSA has issued the first task order for the third phase of the Continuous Diagnostics and Mitigation cybersecurity program and looks for potential bidder responses by September.

Shutterstock image: medical professional interacting with a futuristic, digital interface.

VA sued over sole-source plan for health records

A government contractor is suing the Department of Veterans Affairs over a planned move to shift from its homegrown electronic health records system Vista to the Cerner product used by the U.S. military.

Comptroller General Gene Dodaro

Can reorg plans get agencies off the high-risk list?

As agencies continue preparations to submit their reorganization plans, many also have to reckon with their places on the Government Accountability Office's high-risk list.

Image copyright: David Carillet / Shutterstock

How to spot a North Korean bot

U.S. cyber watchdogs have new details on malware botnet infrastructure that is allegedly controlled by the North Korean government.

Shutterstock image (by ra2studio): young businessman looking at a cloud concept wall.

Are federal agencies ready to bail on data centers?

High-level IT officials across several agencies are ready to say goodbye to on-premise infrastructure.

Shutterstock image: workforce organization chart.

Oversight chairs probe political activities of feds

The chairs of two congressional oversight committees want answers about agencies' policies on granting unpaid leave requests to employees for campaign activity.

Richard Burr official photo, 114th Congress

Senate bill bans joint cyber initiative with Russia

The intelligence authorization bill also mandates a governmentwide plan to combat election hacking and makes changes to personnel policy for cyber professionals.

Shutterstock image (by wk1003mike): cloud system fracture.

Does the IRS have a cloud strategy?

Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

Shutterstock image (by Laborant): clear magnifying glass, blurred binary code.

Watchdog dings DHS data efforts

The Department of Homeland Security needs to do a better job implementing its data strategy, says the agency's inspector general.

Image: Shutterstock

OMB needs to raise its streamlining game, GAO says

The congressional watchdog finds that the Office of Mangagement and Budget has not been keeping up with reporting requirements.

broken lock

Dems want more data on FCC DDoS attacks

As the net neutrality debate heats up, a two lawmakers want more details on a reported attempt to disrupt the FCC's commenting system back in May.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

How data mining can help chase sex traffickers

To aid law enforcement, researchers developed automated data mining techniques that can identify human traffickers by linking bitcoin, online advertisements and writing style.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

More from 1105 Public Sector Media Group