Management


SHUTTERSTOCK ID: 696480235 BY Casimiro PT  IRS website homepage. It is the revenue service of the United States federal government. Irs logo visible.

The IRS wants to talk business

The tax agency's procurement leaders want a more open dialogue with industry, but acknowledge that message doesn’t always make its way down the chain of command.

The Department of Cyber?

As some nations unify their cybersecurity operations, there are calls for a similar effort to create a single agency for civilian cyber authorities in the U.S.

Shutterstock ID: 674184880 By Fotomay Abstract Technology Binary code Background.Digital binary data and Secure Data Concept

Lawmakers worry about a second Heartbleed

Two lawmakers are looking for more information from the executive director of the Linux Foundation about the challenges surrounding the security of open-source software.

people standing on keyboard (Who is Danny/Shutterstock.com)

Looking outside the Beltway for future tech talent

Leidos CEO Roger Krone is looking outside the Washington metro area for engineering and software hires.

8 prototypes of the border walls as tweeted by CBP San Diego

CBP deputy seeks 1,000-mile border wall system

Technology remains a part of the border security balance, but "walls work and agents know it," CBP's Ronald Vitiello said.

by Andrey_Popov shutterstock ID 248796937 Office Chair With A Vacant Sign At Work Place

Does the Vacancies Act really matter?

The law is supposed to prevent acting officials taking on Senate-confirmed roles indefinitely, but the statutory language is vague and enforcement is uneven.

OPM tells agencies how to respond to cyber workforce needs

Agencies will have a year to identify high-value positions, investigate the root causes of any talent shortage and develop action plans before they start reporting annually to OPM.

shutterstock image

Congress wants Patent Office to get a handle on telework

Once the poster child for telework, the Patent and Trademark Office was dinged by multiple oversight reports alleging time and attendance abuse.

hacker at work (Alexander Geiger/Shutterstock.com)

Marines take lessons from special forces in crafting cyber career path

Marine Corps Commandant Gen. Robert B. Neller said long-term stability is key: "Once you’re, in you’re in."

Federal CIO Suzette Kent presents opening remarks for the Women in Federal IT & Cyber event on March 29, 2018. (USDA photo by Tom Witham)

Why IT modernization needs more women

"We're embarking on the largest transformation in the world," federal CIO Suzette Kent said. "Women are more effective collaborators, and what you deliver is actually better."

paths (cybrain/Shutterstock.com)

Why the Army is wary of other transaction authority

Undersecretary of the Army Ryan McCarthy said that while agile acquisition authorities are welcome, there's a risk in using them.

Shutterstock  ID: 667735969 By PopTika

How a terrorist's iPhone became the 'poster child' for the FBI's encryption challenge

According to an oversight report, a senior FBI official became concerned that techies in the bureau were slow-walking a plan to crack the iPhone of the San Bernardino shooter in the hope of obtaining a favorable court verdict.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.