Opinion


Shutterstock image: connecting individuals to one another through an access point.

Dispelling the myth of 'perfect' security

A new approach called micro-segmentation is easy to deploy, requires fewer security resources and could be the key to streamlining risk management.

5 habits of highly effective government power users

Successful power users are technically curious, skilled at communication and highly organized. And they are essential to the government's data revolution.

Shutterstock image: government access keyboard.

Creating federal digital services that actually work

User stories and continuous delivery are vital but count for little if fundamental needs are not being met.

The push for enterprise risk management

Savvy agency leaders are already integrating holistic ERM into decision-making processes as they wait for new guidance from OMB.

Shutterstock Image

Finding the industry linchpins of federal IT

Help FCW and Washington Technology identify this year's Hot Companies to Watch.

Shutterstock image (by Pressmaster): Close-up of two businesswomen shaking hands.

How to be a more effective IT buyer

Armed with data on their spending patterns, suppliers and markets, agencies can manage their demand for IT and shape suppliers' behavior.

Shutterstock image (by MaximP): network defense.

How military strategy can improve cyber response

Cyberattacks will occur. Preparation is the key -- and civilian agencies could take a cue from the military’s sustained readiness model.

Shutterstock image

Cloud security: Learning to trust the facts

The cloud can often exceed the security of an on-premises or legacy data center. Here's why.

email

When using your own email server makes sense

Hillary Clinton’s decision to use a personal server likely arose from the antiquated state of technology at the State Department and her experience in the Senate.

FedRAMP logo. (Update 2014)

FedRAMP Ready or FedRAMP Irrelevant?

Despite GSA’s efforts to accelerate the FedRAMP approval process, the lack of agency reciprocity puts the program’s central goals at risk.

Shutterstock image: the data cloud connecting a number of global services.

5 tips for CSPs looking to leverage FedRAMP Accelerated

Paying attention to these often overlooked capabilities can help cloud service providers speed through GSA's new review process.

Shutterstock image: social media.

Social confusion -- looming records mandates and social media

NARA guidelines offer a starting point, but agencies must make some important determinations themselves.