Agencies that fail to modernize their IT environments accrue significant debt. In this IDC report you’ll discover an ideal path to modernization and how to ensure your IT department operates at peak productivity while significantly reducing costs.
Our process for verifying people's identities is broken, leading some to revisit the idea of a national ID system. But politics, cybersecurity and other concerns loom large in the debate.
Federal CIO Suzette Kent announced the final release of a TIC update designed to accommodate cloud and managed services.
Two contract attorneys tell FCW that the DOD's Cybersecurity Maturity Model Certification framework could have a negative impact on small business and startups.
The latest version comes with a number of notable additions, such as increased flexibility for organizations and a concerted effort to align the agency's privacy and cybersecurity efforts.
A top cyber official at the Department of Homeland Security said the underutilized Automated Indicator Sharing program will be getting a facelift to improve quality and facilitate more complex defensive actions.
The National Security Agency's chief counsel said organizations that suspect a cyberattack should call Homeland Security or the FBI instead.
The solicitation for a single department-wide contract for SOC operations is coming soon, according to agency CIO.
The Defense Department's Cybersecurity Maturity Model Certification framework is ready for public comment.
Following an audit that found the Office of Management and Budget could be making better use of the cybersecurity reviews, Federal CISO Grant Schneider said agency is looking at revamping the program ahead of next fiscal year.
The advisory committee for telecommunications security approved a final report to DHS on protecting communications infrastructure.
In the latest sign enforcement has taken a back seat, a new audit finds that new identity theft cases at the resource-strapped agency have dropped by at least 75% since 2013.
No matter how "smart" a cybersecurity system and program is, there will always be a vulnerability if it's designed to play defense.
The National Guard is contemplating an expansion of its cybersecurity vulnerability assessment pilot following recent ransomware attacks in Texas and Louisiana.
The agencies are seeking public comment on how to structure information collection activities related to its new vulnerability disclosure program.
The Transportation Security Administration is testing its ability to match live photos of air passengers with travel documents using a proprietary algorithmic system.
Sign up for our newsletter.
The Federal Cloud Computing Strategy takes a thoughtful approach to IT modernization.
To support long-term modernization initiatives, agencies must invest in skilled staff and open, automated and collaborative processes.
More Opinion that Matters