Rising Star 2013

Looking for future leaders

Rising Star awards honor individuals doing great things today -- and who are likely to be filling the senior slots tomorrow.

John Gentry.

Four reasons to start with system-wide visibility

As agencies consolidate their IT infrastructures and move to the cloud, infrastructure performance management becomes critical.

Shutterstock image (by dencg): digital warning sign.

Why insider threats keep succeeding

Outdated security models rarely address insider threats, argues John Sellers, and perimeter defense and background checks are not going to keep attackers out.

Valeh Nazemoff

6 questions to ask before any big data migration

Resist the pressure to jump right in, and make sure there is clarity on these fundamental goals and scope.

Shutterstock image (by adirekjob): magnifying glass resting over a missing puzzle piece.

Overcoming fear of the inspector general

Kymm McCabe warns that overly aggressive oversight is costing a fortune and killing off needed communication.

Christopher Steel, Chief Solutions Architect for Software AG Government Solutions.

Test your IT portfolio IQ

By answering the questions in five core areas, IT leaders can see whether they are on the right path with their IT portfolio management practices

Shutterstock image (by Sfio Cracho): businessman looking at the city.

Building more agile project management offices

Delivering business outcomes with continuously changing IT portfolios requires project managers to have a more entrepreneurial skill set.

soldier using tablet pc

Unpacking Terry Halvorsen’s 3 reasons for pursuing BYOD

Bob Stevens contends that the Pentagon's test program is proof of BYOD's importance.

Shutterstock image: executive board room.

Good management or measurement make-work?

Goals are good, but reporting requirements can easily get out of hand.

Shutterstock image: shadowed hacker.

The importance of cyber offense: Sanctions are a good start

Cybercrime is too serious to rely solely on network defenses, Peter Harrell argues.

Shutterstock image (by Maksim Kabakou): cyber defense conept, magnifying glass.

Why cyber defense ultimately rests with the private sector

The government's cybersecurity efforts should be applauded, but companies bear the lion's share of responsibility for protecting their own networks.

Shutterstock image: secure cloud monitoring.

Security-proofing agency business processes

Technology and business teams must come together to address the risks to systems and software that increasingly reside in cloud-based environments.