Opinion


A rare piece of good news for federal cybersecurity

The author argues that government could eliminate identity-based breaches by 2021, if agencies leverage advances in identity management under CDM.

Budget cuts (Gustavo Frazao/ShutterStock)

What Trump’s budget means for government grant managers

Grants will likely require sharped mission and performance, with many of the funding decisions devolving to the states.

Shutterstock image (bygermina): data security concept, shield.

The identity threat

To provide a robust defense and protect the identity-based perimeter, government agencies must consider new thinking and approaches.

Shutterstock image (by Ismagilov): Businessman with arrows pointing left and right.

How investing in technology can transform government and cut costs

A new report shows how, through effective implementation of proven commercial best practice to operations across government, citizens can benefit from over $1 trillion in value over the next decade.

Shutterstock Image

The real story about COTS for the VA

An advocate for the VistA system warns a rush to commercial electronic health records could come with serious risks.

Shutterstock image: cloud network, concept.

5 technology priorities for President Trump

The Obama administration improved government technology, but the Trump team must push it further forward.

Shutterstock image: wall of gears.

IT modernization is just the beginning

A former agency CIO sketches the key challenges for his successors.

Shutterstock image: digital record management.

Will agencies get the full value of their information?

According to a recent survey, gaps between existing skill sets and new requirements could hinder records management outcomes.

Shutterstock image (by GlebStock): hacker with graphic user interface.

The proper perspectives on defending against insider threats

The National Industrial Security Policy Operating Manual is a solid start, but agencies and contractors can't approach this as a compliance exercise.

The future is mobile

How to balance cybersecurity threats and demographic trends in the federal workforce.

Shutterstock image (by bestfoto77): cloud network security lock.

Security in the cloud

SaaS applications are changing the way agencies work - but new security approaches are needed when you no longer have a perimeter to protect.

Excellence (Image: Shutterstock)

In praise of public servants

Recognizing the outstanding work done by government for the nation, every single day.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group