Opinion


Shutterstock imag (by Benjamin Haas): cyber coded team.

How to close the cybersecurity talent gap

By analyzing data on workforce needs and hiring efforts, agencies can take the lead in the race to recruit and retain cybersecurity professionals.

Shutterstock image: an empty board room overlooking the city

Donald Trump's management agenda

The president-elect has hinted at his management priorities. Alan Balutis pulls all those clues into one place.

Photo credit: George Sheldon / Shutterstock.com

Trump’s IT modernization moment

The need to modernize federal IT transcends politics, one industry exec argues, and we already have the tools to make it happen.

Image from Shutterstock.com

Is our IT infrastructure crumbling, too?

Moving to IP-based networks is the answer -- if the right tools are deployed to ensure security.

Shutterstock image.

IT, management advice for the new administration

FCW's columnists, contributors and reporters look at how the incoming Trump administration can tackle management, IT acquisition, cybersecurity and more.

Shutterstock image.

HPC: Fueling the government’s next-generation technology programs

Government and industry have an opportunity to democratize high-performance computing by making it more accessible to nontechnical users.

Don

Innovation in government starts with being intentional

An industry leader argues that it's good to keep the "dinosaurs" on their toes.

Shutterstock image.

What the next president needs to do on cyber

No matter who wins the election, there are key opportunities to expand on current efforts to secure and defend federal networks and critical infrastructure.

Shutterstock image (by igor.stevanovic): anonymous computer hacker.

How to flip the cyberthreat paradigm

By thinking like an adversary, federal agencies can find and fix organizational weaknesses before the bad guys can exploit them.

What the federal CISO needs to get the job done

Newly appointed federal CISO Brig. Gen. Gregory Touhill needs the right tools and enforcement authorities to secure and defend government networks.

Shutterstock.

Next steps after attribution: Deterring further Russian interference

A cybersecurity expert argues that the U.S. should enlist other countries in its response to Russia’s interference in the 2016 elections.

Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

The IT ambitions of USDA

Fiscal 2017 IT budget plans detail how the Agriculture Department aims to be a powerhouse in network and financial services.