There are no items to display
  • Cybersecurity

    Workforce tops cyber commission to-do list

    The Commission on Enhancing National Cybersecurity has completed its public hearings and turns to the tough task of agreeing on recommendations. 09/19/2016

  • Oversight
    Agile Development Stock Image

    There's lots of ambiguity in agencies' embrace of agile

    GAO report warns that OMB's unclear guidance on agile development is interfering with agencies' ability to report on the status of such projects. 09/16/2016

  • Congress
    Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators. 09/15/2016

  • Shutterstock image.

    A sobering take on government contractors: What can be done?

    Steve Kelman has ideas for helping innovative firms clear the hurdles to doing business with the government. 09/15/2016

  • Encryption
    Marcel Lettre, Under Secretary of Defense for Intelligence

    New policy on encryption appears unlikely

    The director of the National Security Agency and the undersecretary of Defense for intelligence told a Senate panel that encryption issues would continue to be handled on a case-by-case basis. 09/13/2016

  • Cloud
    Image from

    Why contract language matters with cloud

    GSA's FedRAMP is a good starting point for cloud security, but experts say agencies must fine-tune their arrangements with vendors by using service-level agreements. 09/13/2016

  • Critical Read
    The U.S. Capitol decked out for a presidential inauguration. (Photo credit: JRAphotographics /

    Managing the transition

    A new report from the Partnership for Public Service wants the next administration to treat government as an integrated enterprise and tap the existing talent pool. 09/12/2016

  • Cybersecurity
    Shutterstock image (by wavebreakmedia): digital lock superimposed upon a data center.

    GSA retools Schedule 70 for cyber

    Government technology purchasers using GSA's Schedule 70 have new options for acquiring cybersecurity services. 09/12/2016

  • Cybersecurity
    Gregory Touhill

    New CISO faces tough sprint

    Greg Touhill, the first governmentwide CISO, will have a long task list and a short window of time as the Obama administration enters its last four months. 09/09/2016

  • Privacy
    Shutterstock image.

    Are NIST's privacy controls out of date?

    Federal chief privacy officers are charged with ensuring that agencies store data legally and safely, but some are concerned that their policy guidelines are outmoded. 09/09/2016

  • Congress
    Photo credit: Ritu Manoj Jethani /

    What a December CR means for federal workers

    Capitol Hill leaders plan to seek a temporary funding measure to keep the government open through Dec. 9, a move that will have consequences for the federal workforce. 09/09/2016

  • Homeland Security
    Jeh Johnson

    Johnson: Cyber reorg should be priority for next Congress

    The long-planned reorganization and upgrade of DHS' primary cybersecurity office should be a top priority for the next Congress, the DHS secretary said. 09/08/2016

  • Acquisition
    man graphs performance

    How the IC can improve acquisitions

    Although ODNI Director James Clapper said the intelligence community's acquisition practices are pretty sound, an advisory council lists some areas to work on. 09/07/2016

  • Policy
    Image Credit/Trump: Ronald Kirk /; Image Credit/Clinton: Evan El-Amin /

    Where do Clinton and Trump stand on tech?

    A new report from ITIF shows that Hillary Clinton has articulated more detailed policy positions on cybersecurity and innovation than has Republican rival Donald Trump. 09/06/2016

  • Cybersecurity
    Barack Obama and Vladimir Putin in September 2015 (Image: Wikimedia Commons)

    Obama looks to avoid cyber arms race

    After meeting with Russian leader Vladimir Putin on the sidelines of G-20 conference, President Barack Obama said he does not want a "Wild, Wild West" scenario when it comes to cyber. 09/06/2016

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group