Opinion


email security

In defense of DMARC

Clearing up some common misunderstandings about email authentication.

IoT security

Time for more robust IOT oversight

Infosec and privacy concerns are going unaddressed in the internet of things ecosystem, and some government agency has to take the lead.

connections (Sergey Nivens/Shutterstock.com)

Bridging the data divide between IT ops and security

When two critical components of an enterprise don’t talk to each other, the enterprise can collapse.

Shutterstock ID: 777532213 By Billion Photos

Make way for the MGT Act

Three ways federal IT program managers can proactively adapt to change.

lock on a chip (shutterstock.com image)

10 tips for agencies looking to address cyber threats

Here's how federal IT teams can better prioritize cyber threats, shift their approach to spending and improve cyber defense.

security (ranjith ravindran/Shutterstock.com)

Why CDM vendors need more flexibility

Prime contractors on the government's Continuous Diagnostics and Mitigation program need the ability to respond with agility to changing threats.

secure network (vs148/Shutterstock.com)

Rethinking TIC: 3 pitfalls to avoid

For government to take full advantage of the cloud, the Trusted Internet Connection program should be reimagined entirely.

teamwork on puzzle (alphaspirit/Shutterstock.com)

A hollow administration?

Hundreds of top agency positions remain unfilled in the Trump administration, but maybe some should stay that way.

shutterstock image ID: 602578109 By nd3000

Solving the 'technical debt' problem

Increasingly IT managers are recognizing that it's time to stop borrowing against the future when it comes to overly complex and outdated applications.

cloud lessons (ScandinavianStock/Shutterstock.com)

Look beyond efficiency when it comes to cloud

Why innovation should be a key driver when it comes to cloud migration.

Shutterstock image (by a-image): connected devices around the world.

Security for the exploding Internet of Things ecosystem

A multilayered approach is needed to protect new mission-focused endpoints from botnets, spyware, insider threats and DDoS attacks.

sphere of binary data

America is losing the cyber war: Here's how to turn the tide

A veteran of DOD's Hack the Pentagon program argues that every agency should be working with white hat hackers.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.