Opinion


Shutterstock image: workforce concept.

How end users can make or break an agency migration

IT modernization is a risky endeavor, and agencies too often overlook the human factor.

Shutterstock image (by Ismagilov): restructuring business processes.

Federal digital transformation: What's next for USDS and 18F?

The government's digital teams have provided desperately needed skills, but government is an "at-scale" enterprise that cannot afford to wait for a small cadre of specialists to make its way around to everyone.

Shutterstock image: connecting individuals to one another through an access point.

Dispelling the myth of 'perfect' security

A new approach called micro-segmentation is easy to deploy, requires fewer security resources and could be the key to streamlining risk management.

5 habits of highly effective government power users

Successful power users are technically curious, skilled at communication and highly organized. And they are essential to the government's data revolution.

Shutterstock image: government access keyboard.

Creating federal digital services that actually work

User stories and continuous delivery are vital but count for little if fundamental needs are not being met.

The push for enterprise risk management

Savvy agency leaders are already integrating holistic ERM into decision-making processes as they wait for new guidance from OMB.

Shutterstock image (by Pressmaster): Close-up of two businesswomen shaking hands.

How to be a more effective IT buyer

Armed with data on their spending patterns, suppliers and markets, agencies can manage their demand for IT and shape suppliers' behavior.

Shutterstock Image

Finding the industry linchpins of federal IT

Help FCW and Washington Technology identify this year's Hot Companies to Watch.

Shutterstock image (by MaximP): network defense.

How military strategy can improve cyber response

Cyberattacks will occur. Preparation is the key -- and civilian agencies could take a cue from the military’s sustained readiness model.

Shutterstock image

Cloud security: Learning to trust the facts

The cloud can often exceed the security of an on-premises or legacy data center. Here's why.

email

When using your own email server makes sense

Hillary Clinton’s decision to use a personal server likely arose from the antiquated state of technology at the State Department and her experience in the Senate.

FedRAMP logo. (Update 2014)

FedRAMP Ready or FedRAMP Irrelevant?

Despite GSA’s efforts to accelerate the FedRAMP approval process, the lack of agency reciprocity puts the program’s central goals at risk.