Opinion


Agile Development Stock Image

5 best practices for agile procurement

As federal CIOs make the shift from managing infrastructure to managing applications, they also need to change their mindset about procurement.

Shutterstock Image

Open source is so much more than free code

The former Department of Veterans Affairs CIO shows how successful development and use of open source software requires collaboration, transparency and a commitment to management.

Shutterstock imag (by Benjamin Haas): cyber coded team.

How to close the cybersecurity talent gap

By analyzing data on workforce needs and hiring efforts, agencies can take the lead in the race to recruit and retain cybersecurity professionals.

Shutterstock image: an empty board room overlooking the city

Donald Trump's management agenda

The president-elect has hinted at his management priorities. Alan Balutis pulls all those clues into one place.

Photo credit: George Sheldon / Shutterstock.com

Trump’s IT modernization moment

The need to modernize federal IT transcends politics, one industry exec argues, and we already have the tools to make it happen.

Image from Shutterstock.com

Is our IT infrastructure crumbling, too?

Moving to IP-based networks is the answer -- if the right tools are deployed to ensure security.

Shutterstock image.

IT, management advice for the new administration

FCW's columnists, contributors and reporters look at how the incoming Trump administration can tackle management, IT acquisition, cybersecurity and more.

Shutterstock image.

HPC: Fueling the government’s next-generation technology programs

Government and industry have an opportunity to democratize high-performance computing by making it more accessible to nontechnical users.

Don

Innovation in government starts with being intentional

An industry leader argues that it's good to keep the "dinosaurs" on their toes.

Shutterstock image.

What the next president needs to do on cyber

No matter who wins the election, there are key opportunities to expand on current efforts to secure and defend federal networks and critical infrastructure.

Shutterstock image (by igor.stevanovic): anonymous computer hacker.

How to flip the cyberthreat paradigm

By thinking like an adversary, federal agencies can find and fix organizational weaknesses before the bad guys can exploit them.

What the federal CISO needs to get the job done

Newly appointed federal CISO Brig. Gen. Gregory Touhill needs the right tools and enforcement authorities to secure and defend government networks.

The Fed 100

Nominations are now being accepted for the 2017 Federal 100 Awards.

More from 1105 Public Sector Media Group