Management


Stock photo ID: 658810513 By asharkyu

GSA tries to raise the profile of EIS

The General Services Administration added new info on how agencies can tap into its next generation telecommunications contract -- and tied the vehicle more closely to IT modernization.

controlling chaos (rudall30/Shutterstock.com)

The biggest challenges for true modernization in 2018

The drive for IT transformation is reaching far beyond technology into every aspect of agency operations.

two-factor authentication (Sentavio/Shutterstock.com)

OMB wants feedback on new ICAM policies

A draft memorandum to strengthen governmentwide identity, credential and access management calls for modernization and more adoption of shared ICAM services.

gears on a blueprint (shutterstock.com)

EIS testing is picking up speed

Eight of 10 contractors for GSA’s next-generation telecommunications contract report progress on required back-office systems tests.

hybrid cloud

How will the CLOUD Act work?

The U.S. recently updated how it handles federal law enforcement data requests for foreign info stored by U.S. companies, but the full impact remains unclear.

Business button mail lock web security icon email online  shutterstock ID: 556318951 By MaximP

Many White House domains lack required email security

Many White House email domains are not compliant with a governmentwide cybersecurity directive, according to tests.

Royalty-free stock photo ID: 594090350  By S.Borisov

White House: Trump won't intervene in DOD cloud deal

Despite his repeated public venting of anger at Amazon, President Trump won't play a part in the Pentagon's move to award a cloud contract, a spokesperson said.

SHUTTERSTOCK ID: 696480235 BY Casimiro PT  IRS website homepage. It is the revenue service of the United States federal government. Irs logo visible.

The IRS wants to talk business

The tax agency's procurement leaders want a more open dialogue with industry, but acknowledge that message doesn’t always make its way down the chain of command.

The Department of Cyber?

As some nations unify their cybersecurity operations, there are calls for a similar effort to create a single agency for civilian cyber authorities in the U.S.

Shutterstock ID: 674184880 By Fotomay Abstract Technology Binary code Background.Digital binary data and Secure Data Concept

Lawmakers worry about a second Heartbleed

Two lawmakers are looking for more information from the executive director of the Linux Foundation about the challenges surrounding the security of open-source software.

people standing on keyboard (Who is Danny/Shutterstock.com)

Looking outside the Beltway for future tech talent

Leidos CEO Roger Krone is looking outside the Washington metro area for engineering and software hires.

8 prototypes of the border walls as tweeted by CBP San Diego

CBP deputy seeks 1,000-mile border wall system

Technology remains a part of the border security balance, but "walls work and agents know it," CBP's Ronald Vitiello said.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.