The growing number of roles with "chief" in the title are complicating governance and security efforts, especially when they bypass the CIO.
Mobile might not be the most serious security risk, but it needs far more attention than it has been getting.
The administration is right to be building bridges with the tech community. But there's talent to be found outside California.
The administration's new governance structure is a solid first step, but legislation is still necessary, writes Shared Services Leadership Coalition CEO John Marshall.
How can agencies modernize while maintaining necessary legacy IT systems? Oddly enough, the answer might be behind us, not in front of us.
The chairman and ranking member of the IT Subcommittee of the House Oversight and Government Reform Committee urge colleagues to pass information sharing legislation that preserves privacy, and to push government to abandon obsolete, risky technology.
If Dell pulls the pieces together correctly in its $67 billion acquisition of EMC, the combined company will be a very formidable cloud services provider in the federal market, says Washington Technology's Nick Wakeman.
Most IT organizations understand the importance of protecting data but have a blind spot regarding the security of the IT systems themselves.
A technology roadmap can help agencies reap the benefits FITARA has to offer. Here are the four stages of a successful effort.
The co-chairs of ACT-IAC's FITARA Implementation Project unveil its first tool for agency IT leaders.
Instead of focusing on breaching the perimeter, attackers have increasingly shifted to compromising the human layer.
To avoid massive data breaches in the future, the government must address its cumbersome acquisition process and misguided IT security practices.