A coming 72-hour breach disclosure mandate from the Department of Defense could inadvertently provide a new attack vector for hackers to harass defense contractors.
A former Obama administration cybersecurity official wants a single agency to take the lead on generating and enforcing security standards for technology products.
Former federal CIO Tony Scott explains why agencies must kick their addiction to custom code.
Alan Balutis and Don Upson debate the wisdom of a cabinet-level IT shop -- and a thorough reorganization of about a dozen other agencies.
With the MGT Act poised to become law, it's a matter of when -- not if -- federal agencies will modernize legacy software and infrastructure.
The next frontier for Continuous Diagnostics and Mitigation.
Steve Kelman applauds a new resource for agencies looking to put agile into action.
How applying automation technology can speed agencies' modernization of outdated systems.
Steve Kelman suggests the upcoming HHS contest could mark a new maturity for challenges as a procurement tool.
The top three technologies for compliance with the cybersecurity executive order.
To truly transform federal IT, agencies will need more than just reallocated resources.
Steve Kelman goes deep with Jose Arrieta about GSA's work to bring distributed ledger technology into the acquisition process.
With the proper technologies in place, agencies can do better assessments and begin to truly address their existing gaps.
How a 1997 military exercise sparked the eventual creation of a unified combatant command for cyber.
Two longtime federal IT leaders discuss the pros and cons of elevating agency CIOs in the executive branch power structure.