SCADA on thin ice Industrial control systems pose little-noticed security threat
Expose those prying eyes Steps and tools that can help you uncover spyware
Critics question biosurveillance system plan
Health officials say federal plan has overly optimistic deadlines, inadequate funding
Security clearance pause puts agencies, contractors at risk
IG tells FAA to rethink telecom program
Editorial: Friday night magic The idea of serving the free steak dinners to soldiers started small but became major events
Welles: Powering up your points
Hurford: Failing at FISMA
Molaski: The need for measures
Telling stories is at the heart of KM
Knowledge captured in digital systems must still be taught, experts say
Soldiers find alternatives to DOD’s Internet cafés
Self-run ISPs keep troops in Iraq connected to loved ones back home
SANS updates vulnerability list
Florida police make data-sharing progress
Meet the new enterprise network
Customs agents are seizing record amounts of pirated IT hardware
But counterfeit technology is finding its way into government agencies
White Hat dons Red Hat
Vets battle for more contract wins
New GWAC could bring more business to some vet-owned companies
Property of the U.S. government
Davis demands more attention to GSA
Name that building
E-Mail this page
Nominations for the 2016 Federal 100 Awards are now being accepted.
Submit your pick today!
With some 14 million letters already out and millions more expected to hit mailboxes by the end of the month, the Office of Personnel Management expects to wrap up notifications to breach victims in the coming weeks.
Steve Kelman continues the conversation on fixing government acquisition.
A governmentwide email retention strategy could have a broad impact on the public and our nation’s history.
Agency CIOs can lead real and lasting change with the help of other government leaders and old-school performance grades.
The Inspector General nominee at the Department of Veterans Affairs told a Senate panel he could institute reform in the short time he'll have on the job.
A reciprocal travel program with 38 participating countries allows for visa-free visits, but a key U.S. senator warns of troubling gaps in the security data.
Antiquated computer systems based on legacy code are a problem for government not just because they are hard to secure, but because it is hard to find people to run them.
Steven Kelman unpacks the argument that social media can negatively affect organizational performance.
GSA's in-house startup tried a reverse auction micro-purchase approach to buying code, and it turned out one techie was willing to work for far cheaper than anyone had imagined.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com