The Department of Homeland Security hasn't been authorized by Congress since it was created in 2002, but a move to change that is gaining momentum in the House.
With the pre-award protests all resolved in GSA's favor, is the $50 billion IT services contract now bulletproof?
While most CFO Act agencies expect to hit the May deadline of the DATA Act, some agencies will need to change their accounting practices and upgrade their systems.
Terry Halvorsen is stepping down as DOD CIO at the end of February. He says the department must push ahead with cyber and IT reforms with an emphasis on developing greater agility.
The Senate panel reviewing the nomination of James Mattis, a retired Marine general, to head the Defense Department focused on strategic threats and agency priorities, including Russia, nuclear modernization, the Pentagon budget and to a small extent, cyber.
President-elect Donald Trump named former New York City Mayor Rudy Giuliani to head a White House committee tasked with tackling cybersecurity challenges.
Deputy Secretary of Defense Robert Work will stay on briefly as the senior Pentagon civilian to assist the incoming Trump administration, and officials say it will be business as usual at DOD until new appointees say otherwise.
On the heels of the president-elect's raucous Jan. 11 press conference, the General Services Administration wants more details on the future of the Trump Hotel doing business in a government building.
A Merit Systems Protection Board study spelled out federal rules regarding nepotism, but it's not clear what application they have to a president hiring an in-law to his White House staff.
The Department of Veterans Affairs awards incentives to attract and retain skilled employees in hard-to-fill positions, but their unauthorized and improper uses could lead to millions of dollars in unsupported spending, according to a recent inspector general report.
Retired Marine Lt. Gen. John Kelly, the would-be leader of the Department of Homeland Security told a Senate panel that a border wall is inadequate and embraced the accuracy of U.S. intelligence on Russian cyber intrusions, and information operations.
A brief history of the Holman Rule, and what it likely means for appropriations, agency programs and individual feds.