Opinion


sphere of binary data

NIAC's timely warning on infrastructure attacks

A White House advisory group recently warned of a 9/11-style attack on American infrastructure. Here's how it could happen.

devops

How automated tools can unlock IT challenges

Continuous Integration and Continuous Delivery are changing government IT.

Shutterstock image.

Smarter regulation through data science

How analytics offers a low-cost alternative to regulation when it comes to monitoring risks to the financial system.

Shutterstock image: filing cabinets.

Managing the risks of data sprawl

A formalized risk framework can help agencies gain control of their entire information lifecycle.

Shutterstock image. Copyright: Lightspring

Accelerating IT modernization

It's not the money, it's the outcome that matters most when it comes to MGT.

Image: Shutterstock / Lemberg Vector Studio

Can't we all just get along?

Some friction between senior careerists and political appointees is inevitable, but a little empathy can go a long way.

Shutterstock image: cyber eye.

How hunt operations can strengthen your security posture

Highly trained teams actively searching for evidence of hackers on the network can spot risks a security operations center might miss.

Shutterstock image: digital technology.

Making modernization happen

Three key budget and policy steps from Congress and the Trump Administration would go a long way toward addressing this critical challenge.

Shutterstock image (by retrorocket): Caught in red tape.

Federal acquisition shops shouldn't wait for direction

Three questions federal acquisition offices must answer after OMB Memo 17-22.

Shutterstock image (Dencg) : digital government concept.

How to ensure successful deployment of new technologies

When crafting a deployment strategy, remember these five best practices.

data abstract

How to report cybersecurity strategies to senior leaders

Government agencies can look to the private sector for the proven elements of a successful executive briefing.

digital key

A security solution that's simple for government, tough for attackers

Format-preserving encryption can secure legacy systems and new solutions alike.