Best practices to help the government overcome obstacles to sharing and achieve information superiority.
The latest attempt at IT reform echoes the IT Management Reform Act, better known as Clinger-Cohen...so watch OMB’s reaction carefully.
NSA’s new guard against insider threats is a good start but not nearly enough.
Software can't solve these fatal flaws, but understanding and preparing for the risks can.
In a mobile world, device-level encryption and digital rights management are essential to securing sensitive data.
When the performance of new IT leaders flags, the whole organization suffers. Here are some tips for successful transitions.
The broker model is mutually beneficial for providers, agencies and taxpayers because it centralizes services and pricing.
Cloud brokers can ease agencies' transition to the cloud and ensure that they reap the advantages of a dynamic marketplace.
To meet VanRoekel's challenge, government must change the way it thinks about risk.
Agencies can achieve a much bigger bang for their precious bucks by investing in better management of existing security assets.
Top-level agency leaders are often unaware of the risks their agencies face -- and content to remain that way, argues NARA's CISO.
Coming into an agency as the new sheriff in town is hard enough. Don’t make it worse by importing your inner circle.