Opinion


security (ranjith ravindran/Shutterstock.com)

Why CDM vendors need more flexibility

Prime contractors on the government's Continuous Diagnostics and Mitigation program need the ability to respond with agility to changing threats.

secure network (vs148/Shutterstock.com)

Rethinking TIC: 3 pitfalls to avoid

For government to take full advantage of the cloud, the Trusted Internet Connection program should be reimagined entirely.

teamwork on puzzle (alphaspirit/Shutterstock.com)

A hollow administration?

Hundreds of top agency positions remain unfilled in the Trump administration, but maybe some should stay that way.

shutterstock image ID: 602578109 By nd3000

Solving the 'technical debt' problem

Increasingly IT managers are recognizing that it's time to stop borrowing against the future when it comes to overly complex and outdated applications.

cloud lessons (ScandinavianStock/Shutterstock.com)

Look beyond efficiency when it comes to cloud

Why innovation should be a key driver when it comes to cloud migration.

Shutterstock image (by a-image): connected devices around the world.

Security for the exploding Internet of Things ecosystem

A multilayered approach is needed to protect new mission-focused endpoints from botnets, spyware, insider threats and DDoS attacks.

sphere of binary data

America is losing the cyber war: Here's how to turn the tide

A veteran of DOD's Hack the Pentagon program argues that every agency should be working with white hat hackers.

Shutterstock image: discussing a contract.

Are RFIs a waste of time and money?

Vendors expend valuable resources on market research efforts for agencies, without knowing whether there's a business opportunity in the offing.

Shutterstock image (by wavebreakmedia): digital lock superimposed upon a data center.

The revolution of obfuscation for cybersecurity and threat intelligence

Without the proper protections, threat intelligence can do more harm than good.

By Lida b2b ShutterStock photo ID: 566784571

Why the telecom transition makes it a good time for UC

The transition to the $50 billion Enterprise Infrastructure Solutions contract should have feds thinking about unified communications in the cloud.

Shutterstock image (by Pavel Ignatov): digital email icon.

Securing government email is a critical step for U.S. cybersecurity

Agencies could soon be leaders in authenticating email, but there still much work to be done.

Time to fix the TIC

Why modernizing trusted internet connection requirements will help speed agencies' path to the cloud.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.