How can agencies modernize while maintaining necessary legacy IT systems? Oddly enough, the answer might be behind us, not in front of us.
The chairman and ranking member of the IT Subcommittee of the House Oversight and Government Reform Committee urge colleagues to pass information sharing legislation that preserves privacy, and to push government to abandon obsolete, risky technology.
Most IT organizations understand the importance of protecting data but have a blind spot regarding the security of the IT systems themselves.
If Dell pulls the pieces together correctly in its $67 billion acquisition of EMC, the combined company will be a very formidable cloud services provider in the federal market, says Washington Technology's Nick Wakeman.
A technology roadmap can help agencies reap the benefits FITARA has to offer. Here are the four stages of a successful effort.
The co-chairs of ACT-IAC's FITARA Implementation Project unveil its first tool for agency IT leaders.
Instead of focusing on breaching the perimeter, attackers have increasingly shifted to compromising the human layer.
To avoid massive data breaches in the future, the government must address its cumbersome acquisition process and misguided IT security practices.
It's not too early to start thinking about how to help the upcoming administration define its priorities for improving federal IT.
Effective implementation of FITARA is the government’s best hope to address decades of mismanagement and make IT systems more secure.
The new law empowers CIOs to fully integrate mobile technology into the federal workplace — and transform employee productivity.
Efforts to weaken encryption are misguided and will do nothing to protect individuals or national security.