Mobile might not be the most serious security risk, but it needs far more attention than it has been getting.
The administration is right to be building bridges with the tech community. But there's talent to be found outside California.
The administration's new governance structure is a solid first step, but legislation is still necessary, writes Shared Services Leadership Coalition CEO John Marshall.
How can agencies modernize while maintaining necessary legacy IT systems? Oddly enough, the answer might be behind us, not in front of us.
The chairman and ranking member of the IT Subcommittee of the House Oversight and Government Reform Committee urge colleagues to pass information sharing legislation that preserves privacy, and to push government to abandon obsolete, risky technology.
Most IT organizations understand the importance of protecting data but have a blind spot regarding the security of the IT systems themselves.
If Dell pulls the pieces together correctly in its $67 billion acquisition of EMC, the combined company will be a very formidable cloud services provider in the federal market, says Washington Technology's Nick Wakeman.
A technology roadmap can help agencies reap the benefits FITARA has to offer. Here are the four stages of a successful effort.
The co-chairs of ACT-IAC's FITARA Implementation Project unveil its first tool for agency IT leaders.
Instead of focusing on breaching the perimeter, attackers have increasingly shifted to compromising the human layer.
To avoid massive data breaches in the future, the government must address its cumbersome acquisition process and misguided IT security practices.
It's not too early to start thinking about how to help the upcoming administration define its priorities for improving federal IT.