Here's how federal IT teams can better prioritize cyber threats, shift their approach to spending and improve cyber defense.
Prime contractors on the government's Continuous Diagnostics and Mitigation program need the ability to respond with agility to changing threats.
For government to take full advantage of the cloud, the Trusted Internet Connection program should be reimagined entirely.
Hundreds of top agency positions remain unfilled in the Trump administration, but maybe some should stay that way.
Increasingly IT managers are recognizing that it's time to stop borrowing against the future when it comes to overly complex and outdated applications.
Why innovation should be a key driver when it comes to cloud migration.
A multilayered approach is needed to protect new mission-focused endpoints from botnets, spyware, insider threats and DDoS attacks.
A veteran of DOD's Hack the Pentagon program argues that every agency should be working with white hat hackers.
Vendors expend valuable resources on market research efforts for agencies, without knowing whether there's a business opportunity in the offing.
Without the proper protections, threat intelligence can do more harm than good.
The transition to the $50 billion Enterprise Infrastructure Solutions contract should have feds thinking about unified communications in the cloud.
Agencies could soon be leaders in authenticating email, but there still much work to be done.