Outdated security models rarely address insider threats, argues John Sellers, and perimeter defense and background checks are not going to keep attackers out.
Resist the pressure to jump right in, and make sure there is clarity on these fundamental goals and scope.
Kymm McCabe warns that overly aggressive oversight is costing a fortune and killing off needed communication.
By answering the questions in five core areas, IT leaders can see whether they are on the right path with their IT portfolio management practices
Delivering business outcomes with continuously changing IT portfolios requires project managers to have a more entrepreneurial skill set.
Bob Stevens contends that the Pentagon's test program is proof of BYOD's importance.
Goals are good, but reporting requirements can easily get out of hand.
Cybercrime is too serious to rely solely on network defenses, Peter Harrell argues.
The government's cybersecurity efforts should be applauded, but companies bear the lion's share of responsibility for protecting their own networks.
Technology and business teams must come together to address the risks to systems and software that increasingly reside in cloud-based environments.
Rather than falling back on the same old solutions, federal IT professionals should discern the best approach to achieve the desired outcome.
The first four years of the administration's policy have been hampered by budget pressures, but the cost economies of cloud technology will drive faster adoption.