The post-CISA privacy regime is here. Will it satisfy critics?
The National Security Telecommunications Advisory Committee at DHS wants the new federal chief information security officer to drive policy and have real visibility across agencies.
The tech industry welcomes more open-source software in the federal government, but with a few caveats.
The cloud services vetting office wants to open its process to the public via a dashboard built under 18F's agile blanket purchase agreement.
Teams of techies will bring new acquisition models to seven agencies as part of the Digital Acquisitions Pilot.
The FCC circulated a new proposal March 10 that outlines Commissioner Tom Wheeler's plan to address what information Internet Service Providers can collect and share about their customers.
The advice in a 15-year-old Government Accountability Office report is remarkably relevant to the CIO's role in the FITARA era.
The planned nationwide, wireless broadband public safety network still has November as a contract award date target.
Federal CIO Tony Scott is pushing out a plan to allow custom code developed by or for the government to be shared across agencies, and in some cases released to the public.
"We increasingly need to reach out to commercial companies," many of which are unfamiliar with federal acquisition regulations, said Jennifer Walsmith, NSA's senior acquisition executive.
Great work has been done on the General Services Administration's Enterprise Infrastructure Solutions contract, but the hard work has barely begun.
DHS Secretary Jeh Johnson hopes to build his legacy by shoring up the cyber workforce and driving management reforms.
The Department of Veterans Affairs announced 21 contract awards on its Transformation Twenty-One Total Technology Next Generation acquisition program.
Veteran IT planner Bill Zielinski will direct category management solutions for GSA's IT acquisition services as the agency moves closer to its category-focused goals.
The plan prioritizes identity authentication, reducing DOD networks’ attack surface, device hardening, and aligning computer network defenders with DOD IT systems and networks.
In the latest issue: grid security, agile development, BYOD and more!
Get the full issue
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com