Opinion


Lightbulb from FCW Nov/Dec 2017 cover

'Reinventing government,' 25 years later

In 1993, the government began shifting its focus to performance, but the question remains: Has the procurement system improved?

Shutterstock image: illuminated connections between devices.

Government dollars for IoT: Large and unbalanced

Civilian agencies should take a lesson from the Defense Department -- and all of government should look to smaller, emerging tech companies as well as traditional contractors.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

Will new breach reporting rules make defense firms more secure?

A coming 72-hour breach disclosure mandate from the Department of Defense could inadvertently provide a new attack vector for hackers to harass defense contractors.

A Consumer Product Safety Commission for cyber?

A former Obama administration cybersecurity official wants a single agency to take the lead on generating and enforcing security standards for technology products.

Shutterstock image: software development.

Why is there so much customized software in the federal government?

Former federal CIO Tony Scott explains why agencies must kick their addiction to custom code.

Shutterstock image: wall of gears.

A modest proposal to improve government IT

Alan Balutis and Don Upson debate the wisdom of a cabinet-level IT shop -- and a thorough reorganization of about a dozen other agencies.

Shutterstock Image ID: 702495127 By vectorplus

5 things to think about when modernizing agency IT

With the MGT Act poised to become law, it's a matter of when -- not if -- federal agencies will modernize legacy software and infrastructure.

Shutterstock image: open lock.

CDM and automation

The next frontier for Continuous Diagnostics and Mitigation.

Cobol code

Automation is the secret to modernization

How applying automation technology can speed agencies' modernization of outdated systems.

gold shield on top of computer code

How agencies can get in step with the cyber EO

The top three technologies for compliance with the cybersecurity executive order.

room of computers

The White House IT report sounds good, but funding is still needed

To truly transform federal IT, agencies will need more than just reallocated resources.

digital key

Acting on the cyber executive order: 3 keys to compliance

With the proper technologies in place, agencies can do better assessments and begin to truly address their existing gaps.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.