Opinion


Shutterstock image: social media brain.

How social media can help spot insider threats

A recent directive on using individuals’ social media activity in the security clearance process is a good first step, but it could go even further.

Shutterstock image (by Makkuro GL): crowdsourcing innovation.

Beyond the lab: Government innovation in unlikely places

Dedicated innovation shops are in vogue, but a culture of user-centered thinking can be put to work in any corner of government.

Shutterstock image: workforce concept.

How end users can make or break an agency migration

IT modernization is a risky endeavor, and agencies too often overlook the human factor.

Shutterstock image (by Ismagilov): restructuring business processes.

Federal digital transformation: What's next for USDS and 18F?

The government's digital teams have provided desperately needed skills, but government is an "at-scale" enterprise that cannot afford to wait for a small cadre of specialists to make its way around to everyone.

Shutterstock image: connecting individuals to one another through an access point.

Dispelling the myth of 'perfect' security

A new approach called micro-segmentation is easy to deploy, requires fewer security resources and could be the key to streamlining risk management.

5 habits of highly effective government power users

Successful power users are technically curious, skilled at communication and highly organized. And they are essential to the government's data revolution.

Shutterstock image: government access keyboard.

Creating federal digital services that actually work

User stories and continuous delivery are vital but count for little if fundamental needs are not being met.

The push for enterprise risk management

Savvy agency leaders are already integrating holistic ERM into decision-making processes as they wait for new guidance from OMB.

Shutterstock Image

Finding the industry linchpins of federal IT

Help FCW and Washington Technology identify this year's Hot Companies to Watch.

Shutterstock image (by Pressmaster): Close-up of two businesswomen shaking hands.

How to be a more effective IT buyer

Armed with data on their spending patterns, suppliers and markets, agencies can manage their demand for IT and shape suppliers' behavior.

Shutterstock image (by MaximP): network defense.

How military strategy can improve cyber response

Cyberattacks will occur. Preparation is the key -- and civilian agencies could take a cue from the military’s sustained readiness model.

Shutterstock image

Cloud security: Learning to trust the facts

The cloud can often exceed the security of an on-premises or legacy data center. Here's why.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

More from 1105 Public Sector Media Group