Protecting government IT systems at the source

Most IT organizations understand the importance of protecting data but have a blind spot regarding the security of the IT systems themselves.

Wikimedia images: Dell and EMC logos.

Dell-EMC: Let the revolution begin

If Dell pulls the pieces together correctly in its $67 billion acquisition of EMC, the combined company will be a very formidable cloud services provider in the federal market, says Washington Technology's Nick Wakeman.

Shutterstock image.

Roadmapping: A key tool for FITARA compliance

A technology roadmap can help agencies reap the benefits FITARA has to offer. Here are the four stages of a successful effort.

Making FITARA matter: An IT management maturity model

The co-chairs of ACT-IAC's FITARA Implementation Project unveil its first tool for agency IT leaders.

Shutterstock image (by GlebStock): hacker with graphic user interface.

Every threat is an insider threat

Instead of focusing on breaching the perimeter, attackers have increasingly shifted to compromising the human layer.

Richard Spires

IT Insecurity: Aggressive use of security solutions

To avoid massive data breaches in the future, the government must address its cumbersome acquisition process and misguided IT security practices.

Dave Wennergren

Ideas for the next president

It's not too early to start thinking about how to help the upcoming administration define its priorities for improving federal IT.

Richard Spires

IT insecurity and the need for better management

Effective implementation of FITARA is the government’s best hope to address decades of mismanagement and make IT systems more secure.

Scott French is vice president of government at Panasonic System Communications Co. of North America.

How will FITARA affect government mobility?

The new law empowers CIOs to fully integrate mobile technology into the federal workplace — and transform employee productivity.

Dwayne Melancon is Tripwire’s chief technology officer.

Ban encryption? Don't believe the hype

Efforts to weaken encryption are misguided and will do nothing to protect individuals or national security.

Trey Hodgkins

A neglected casualty of a government shutdown

It can be tough for contractors to recover from a shutdown, which has broad implications for the effectiveness of agencies' IT operations.

Records management: Are agencies getting full return on information?

A recent survey found that only 33 percent of federal employees are very confident in current records programs.

The Fed 100

Nominations for the 2016 Federal 100 Awards are now being accepted. 

More from 1105 Public Sector Media Group