Opinion


A rare piece of good news for federal cybersecurity

The author argues that government could eliminate identity-based breaches by 2021, if agencies leverage advances in identity management under CDM.

Budget cuts (Gustavo Frazao/ShutterStock)

What Trump’s budget means for government grant managers

Grants will likely require sharped mission and performance, with many of the funding decisions devolving to the states.

Shutterstock image (bygermina): data security concept, shield.

The identity threat

To provide a robust defense and protect the identity-based perimeter, government agencies must consider new thinking and approaches.

Shutterstock image (by Ismagilov): Businessman with arrows pointing left and right.

How investing in technology can transform government and cut costs

A new report shows how, through effective implementation of proven commercial best practice to operations across government, citizens can benefit from over $1 trillion in value over the next decade.

Shutterstock Image

The real story about COTS for the VA

An advocate for the VistA system warns a rush to commercial electronic health records could come with serious risks.

Shutterstock image: cloud network, concept.

5 technology priorities for President Trump

The Obama administration improved government technology, but the Trump team must push it further forward.

Shutterstock image: wall of gears.

IT modernization is just the beginning

A former agency CIO sketches the key challenges for his successors.

Shutterstock image: digital record management.

Will agencies get the full value of their information?

According to a recent survey, gaps between existing skill sets and new requirements could hinder records management outcomes.

Shutterstock image (by GlebStock): hacker with graphic user interface.

The proper perspectives on defending against insider threats

The National Industrial Security Policy Operating Manual is a solid start, but agencies and contractors can't approach this as a compliance exercise.

The future is mobile

How to balance cybersecurity threats and demographic trends in the federal workforce.

Shutterstock image (by bestfoto77): cloud network security lock.

Security in the cloud

SaaS applications are changing the way agencies work - but new security approaches are needed when you no longer have a perimeter to protect.

Excellence (Image: Shutterstock)

In praise of public servants

Recognizing the outstanding work done by government for the nation, every single day.