The co-chairs of ACT-IAC's FITARA Implementation Project unveil its first tool for agency IT leaders.
Instead of focusing on breaching the perimeter, attackers have increasingly shifted to compromising the human layer.
To avoid massive data breaches in the future, the government must address its cumbersome acquisition process and misguided IT security practices.
It's not too early to start thinking about how to help the upcoming administration define its priorities for improving federal IT.
Effective implementation of FITARA is the government’s best hope to address decades of mismanagement and make IT systems more secure.
The new law empowers CIOs to fully integrate mobile technology into the federal workplace — and transform employee productivity.
Efforts to weaken encryption are misguided and will do nothing to protect individuals or national security.
It can be tough for contractors to recover from a shutdown, which has broad implications for the effectiveness of agencies' IT operations.
A recent survey found that only 33 percent of federal employees are very confident in current records programs.
The FTC's chief technologist recently had his laptop stolen. What happened next shows just how valuable end-user privacy and security controls can be.
Government innovation is a no-go unless agencies, prime contractors and startups come together to clear the path.
The natural tendency of RFPs and RFIs to protect outdated architectures must be overcome if FITARA is to succeed.