Opinion


Image from Shutterstock.

Why precision attacks succeed, and what agencies need to know

The OPM breach is getting all the attention, but recent attacks on State Department and White House systems should have agencies equally concerned.

Dave McClure_Veris Group

Ground rules for improving federal cybersecurity

In today’s complex cybersecurity environment, these three elements form the foundation of agencies’ ability to defend networks and data.

Karen S. Evans

A more efficient path to online accessibility

Karen Evans explains why a global accessibility standard is in everyone's interest -- and why agency CIOs should help push for it.

Shutterstock image (by zimmytws): Map of the Silicon Valley section of California - San Fransisco and Palo Alto.

When the agency CIO heads to Silicon Valley

Never mind the dress codes. The real divide between East and West is over how to build and for whom.

A.J. Clark of Thermopylae

DOD needs a change in acquisition culture

The Pentagon needs a modern, agile acquisition process that can get technology into the field faster — and industry should take the lead.

Shutterstock image (by Ismagilov): Businessman with arrows pointing left and right.

Secure sharing: Maintaining the right balance

Think you can succeed by zeroing in on a single problem? Sorry, but life is not that simple.

Complexity (Shutterstock image)

Why acquisition reforms fall short

After two decades of good intentions, it's time for an enterprise strategy for IT acquisition and management.

Rising Star 2013

Looking for future leaders

Rising Star awards honor individuals doing great things today -- and who are likely to be filling the senior slots tomorrow.

John Gentry.

Four reasons to start with system-wide visibility

As agencies consolidate their IT infrastructures and move to the cloud, infrastructure performance management becomes critical.

Shutterstock image (by dencg): digital warning sign.

Why insider threats keep succeeding

Outdated security models rarely address insider threats, argues John Sellers, and perimeter defense and background checks are not going to keep attackers out.

Valeh Nazemoff

6 questions to ask before any big data migration

Resist the pressure to jump right in, and make sure there is clarity on these fundamental goals and scope.

Shutterstock image (by adirekjob): magnifying glass resting over a missing puzzle piece.

Overcoming fear of the inspector general

Kymm McCabe warns that overly aggressive oversight is costing a fortune and killing off needed communication.

FCW in Print

Check out the digital edition of FCW magazine -- the federal IT community's premier publication.

In this issue: Profiles of every Fed 100 winner, the government and industry Eagle Award winners and more.

More from 1105 Public Sector Media Group