The best-laid plan? Experts debate whether the National Strategy to Secure Cyberspace is still relevant — if it ever was
Preventive measures Making software programmers more security-minded from the start can reduce costs and headaches later on
Lights out Taking down part of the country’s fiber-optic network could be a crippling blow, but is it so easily done?
Emergency war spending bill sacrifices IT
Bush shifts technology funds to border security
IWN moves to second phase
Williams, Doan get high marks at the start
Editorial: Security: The VA’s reminder Mistakes such as the recent theft of Department of Veterans Affairs data have consequences -- both good and bad.
Swire: Is data retention secure?
McFarland confident about VA changes
Former CIO says recent data theft highlights need to transform internal IT governance
NOAA responds to IG's censure
Encryption from the database to the laptop PC
Vendor initiatives abound for securing sensitive data
Quick look: Itronix goes semirugged
Contractors seek edge by hiring former feds
Feds’ knowledge of acquisition regs considered a big plus
VA data theft sparks marketing blitz
COOP policies lack leadership
Policy-makers push telework to the center of business continuity planning
Safety Act rule improves process
Lost conference costs more than dollars
Web tech could aid electronic health record push
Alliant contracts move ahead
Teresa Takai’s 10 tips for change
E-Mail this page
Read the profiles of all this year's winners.
Click here for more
The Air Force is the latest military service to partner with HackerOne on a bug bounty competition where hackers can win prize money by finding vulnerabilities in Air Force sites.
DHS, GSA and customer agencies discuss deployment efforts and ideas for future improvement.
Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.
New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.
It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One
U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.
8251 Greensboro Drive, Suite 510, McLean, VA 22102 | 703-876-5100
© 1996-2017 1105 Media, Inc. All Rights Reserved.