Opinion


Shutterstock image: breached lock.

A breach is coming -- is your agency ready?

The key to successfully navigating a security breach is to develop a three-pronged, comprehensive incident response process ahead of time.

Shutterstock image.

How to take control of federal performance management

Six steps human capital officers can take to improve performance at agencies.

Shutterstock image. Copyright  enzozo.

The hidden cybersecurity risk for federal contractors

Firms could face friendly fire under the False Claims Act.

Shutterstock image: digital charts and graphs.

The monumental IT opportunity of the 2020 census

The Census Bureau faces some significant challenges, but recent technology advancements can make its job much easier.

Wikimedia image: Silicon Valley.

Wish they all could be... (Part II)

How can the innovation culture of Silicon Valley help government technology? Two experts count the ways.

Shutterstock image: discussing a contract.

What to make of OMB's software licensing initiative

While most of the IT community was Christmas shopping, the Obama administration unveiled a plan that could radically reshape IT acquisition.

Shutterstock image (by Maksim Kababou): cloud technology concept.

Truly committing to innovation and the cloud

Government's success is enabled by using contracting practices that reward rather than discourage new ideas and approaches.

abstract image of money

How to manage agency budgets in real time

Here are three steps for moving from static spreadsheets to truly dynamic tools that support decision-making and mission analysis.

Shutterstock image.

The limits (and myths) of security

Five principles for securing government information systems can help agencies better understand and manage risk.

Shutterstock image (by Sentavio): Collaboration facilitated by cloud technology.

The future of cloud: Moving up the value chain

Cloud technology is reducing costs and enhancing agencies' focus on what to do with data instead of how to store or manage it. And that is only the beginning.

a man grouping items by shape

The key to successful IT consolidation efforts

Application portfolio management is a vital component of agencies' efforts to do more with less while keeping the focus on achieving their mission.

Shutterstock image: cyber eye.

How to identify cyberattacks early and limit damage

A focus on real-time analytics is necessary to gain a long-term information advantage over attackers.