Opinion


Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

Will new breach reporting rules make defense firms more secure?

A coming 72-hour breach disclosure mandate from the Department of Defense could inadvertently provide a new attack vector for hackers to harass defense contractors.

A Consumer Product Safety Commission for cyber?

A former Obama administration cybersecurity official wants a single agency to take the lead on generating and enforcing security standards for technology products.

Shutterstock image: software development.

Why is there so much customized software in the federal government?

Former federal CIO Tony Scott explains why agencies must kick their addiction to custom code.

Shutterstock image: wall of gears.

A modest proposal to improve government IT

Alan Balutis and Don Upson debate the wisdom of a cabinet-level IT shop -- and a thorough reorganization of about a dozen other agencies.

Shutterstock Image ID: 702495127 By vectorplus

5 things to think about when modernizing agency IT

With the MGT Act poised to become law, it's a matter of when -- not if -- federal agencies will modernize legacy software and infrastructure.

Shutterstock image: open lock.

CDM and automation

The next frontier for Continuous Diagnostics and Mitigation.

Cobol code

Automation is the secret to modernization

How applying automation technology can speed agencies' modernization of outdated systems.

gold shield on top of computer code

How agencies can get in step with the cyber EO

The top three technologies for compliance with the cybersecurity executive order.

room of computers

The White House IT report sounds good, but funding is still needed

To truly transform federal IT, agencies will need more than just reallocated resources.

digital key

Acting on the cyber executive order: 3 keys to compliance

With the proper technologies in place, agencies can do better assessments and begin to truly address their existing gaps.

Shutterstock image: cyber defense.

The 20-year climb to an elevated CyberCom

How a 1997 military exercise sparked the eventual creation of a unified combatant command for cyber.

Shutterstock image: executive connecting individuals to one another.

The CIO and government IT

Two longtime federal IT leaders discuss the pros and cons of elevating agency CIOs in the executive branch power structure.

Cyber. Covered.

Government Cyber Insider tracks the technologies, policies, threats and emerging solutions that shape the cybersecurity landscape.

More from 1105 Public Sector Media Group