The coming mobile explosion

Security and BYOD concerns move closer to resolution as the trend toward greater use of mobile devices picks up speed.

Old procurement tools gain new luster

Reverse auctions, strategic sourcing and other procurement techniques are expected to find renewed enthusiasm in 2013.

ID management moves past passwords

As it becomes widely recognized that simple techniques aren't secure enough to prevent unauthorized access to government information, agencies are considering other options.