Opinion


Shutterstock image: digital record management.

VA’s EHR decision and the future of government

By using insight-driven thinking and tools, the collaboration between VA and DOD could result in a revolutionary person-centric service model.

Shutterstock image (by Ismagilov): restructuring business processes.

The real key to technology transformation

CIO authorities are important, but communication and governance cannot be overlooked when it comes to achieving FITARA’s objectives.

Shutterstock image

Breakthroughs in risk-based cyberattack detection

What government can learn from a utility company's embrace of machine learning.

Shutterstock image: shadowed hacker.

Empowering DOD with critical cyber training

The Department of Defense does face challenges in building its cyber force, but there are proven ways to fill the talent pipeline.

broken lock

Prudence over panic

A seasoned CISO explains why focusing too much on zero-days can distract from older vulnerabilities.

Shutterstock images (by Ingka D. Jiw and Oberon): ballot box, budget/costs concept.

IT acquisition reform's time is now

Promising examples abound, but real leadership focus is needed to achieve meaningful digital government services and security.

Shutterstock image: software developer.

Buy vs. build to reduce insider threats

Commercially supported open source comes with both cost and security benefits.

Shutterstock image.

Government's unending saga of management reform

The problem with President Trump's management agenda is not its particulars -- it's that we've been talking about the same changes for decades.

Thunderbird Supercomputer at the Sandia National Labs.

The case for investing in high-performance computing

HPC is a vital driver of U.S. innovation, competitiveness and security. Strong government support is key to sustaining all three.

How analytics can transform federal real estate budget planning

By combining financial and asset management data, agencies can build a systems for better decision making.

Shutterstock image. Copyright: Kalakruthi

Why compliance demands a DevOps approach

Security compliance doesn't have to stifle innovation -- it should baked into the agile development process.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

Why the CDM program needs an overhaul

By focusing on legacy attack vectors, DHS’ cybersecurity program fails to address rapidly evolving new threats.