You will be redirected to the page you want to view in  seconds.


  1. Acting Associate Administrator of the Office of Citizen Services and Innovative Technologies Kathy Conrad (center), FedRAMP Director Matthew Goodrich (center-right) and Information Systems Security Manager Claudio Belloli (right) talk with reporters ahead of releasing 'FedRAMP Forward.' Aaron Boyd/Staff

    'FedRAMP Forward' plans next two years of cloud authorization

    Timeline lays out improvements to be phased in over next 24 months.

    • Dec. 17, 2014
  2. 5 federal IT changes for the new year

    Federal IT can build on progress made in 2014, but some shifts will help that to happen.

    • Dec. 17, 2014
  3. Sen. Tom Carper, D-Del., acknowledged agencies have made progress toward better cybersecurity but need to do more. Staff

    2014 FISMA reduces paperwork, codifies management structure

    Agencies won't have to complete huge three-year reports but will have to submit information on security incidents.

    • Dec. 16, 2014
  4. Philip Reitinger, a former executive with the departments of Homeland Security, Justice and Defense, thinks a central cyber campus is a valuable step. Courtesy Photo

    New campus to centralize cybersecurity workforce

    GSA secures funding for cyber campus for civilian employees.

    • Dec. 15, 2014
  5. Michael Kushin is senior vice president at CACI International Inc. He has more than 25 years of experience developing secure solutions for the Defense Department and the Intelligence Community, and is responsible for delivering cybersecurity solutions at CACI. Courtesy Photo

    Drones and cybersecurity part 1: The challenges we face and cybersecurity's role

    The computers that direct the actions of drones can also be a way to defeat them.

    • Dec. 15, 2014
  6. The General Services Administration wants to know what metrics to use in assessing vendors' ability to deliver on information security and integrity. Staff

    GSA developing vendor IT security assessments

    RFI asks industry for advice on how government should rate companies for information security.

    • Dec. 15, 2014
  7. An FBI profiling team is turning its attention to insider threats. WikiPedia

    FBI profilers look for insider threats

    A unit of the bureau is studying the technological tools that might help find problematic employees before they cause harm.

    • Dec. 11, 2014
  8. The idea for a Senate Cyber Caucus came up during a panel discussion that included Sen. Sheldon Whitehouse, D-R.I., who was in favor of creating a bipartisan group. Office of Sen. Sheldon Whitehouse

    7 Senators to consider for a 'Cyber Caucus'

    An idea for a bipartisan Cyber Caucus in the Senate got us thinking: Who should be tapped?

    • Dec. 10, 2014
  9. Michael Fischetti is the Executive Director of the National Contract Management Association. Jenifer Morris

    Contracting's complexity and the impact on its managers

    The top-down evolution of today's contracting system created today's complexity.

    • Dec. 9, 2014
  10. DARPA researcher Dr. Angelos Keromytis is program manager for the Transparent Computing initiative, focused on a new way to detect and mitigate advanced persistent threats. DARPA image

    DARPA sees future of cybersecurity in Transparent Computing

    Research agency is soliciting proposals for a holistic, adaptive approach to securing networks.

    • Dec. 8, 2014
  11. A vulnerability in a Mobile Device Management system used by government agencies could allow an attacker to run arbitrary code. U.S. Army photo

    Bug in IBM mobile device manager opens critical security gap

    Vulnerability could give attacker access to all devices on managed network.

    • Dec. 5, 2014
  12. Assistant Attorney General Leslie Caldwell introduced the new Cybersecurity Unit at the Cybercrime 2020 Symposium at Georgetown Law. Georgetown Law

    New DOJ Cybersecurity Unit to advise on Internet crime

    Team of 20-plus lawyers will focus on electronic surveillance and cyber crime.

    • Dec. 5, 2014
  13. Anne Rung is the Administrator for the Office of Federal Procurement Policy at the Office of Management and Budget. Courtesy

    Simplifying federal procurement

    OFPP's new director on improving performance, driving innovation and increasing savings.

    • Dec. 4, 2014
  14. Kevin R. Smith is a senior program manager at Integrity Management Consulting. Courtesy

    Making the business case for cybersecurity

    Even with the growing cyber threat, agencies are being asked to defend their IT portfolios and adapt new technologies in order to reduce IT spending.

    • Dec. 1, 2014
  15. Patrick Howard is Program Manager for CDM & CMaaS at Kratos SecureInfo, and is former Chief Information Security Officer at the Nuclear Regulatory Commission and the Department of Housing and Urban Development. Courtesy Photo

    CDM: Don't forget the human in the equation

    Effective CDM strategy consists of more than just selecting and installing shiny new tools.

    • Dec. 1, 2014
  16. Driving the federal government towards a Low Price Regardless (LPR) contracting model

    A new Prices Paid Portal is intended to reduce agency costs for goods and services by providing greater visibility on the prices agencies have paid for them.

    • Dec. 1, 2014
  17. Jordon Sims is director of organization relations and programs for the Project Management Institute. He formerly served as an active-duty submarine officer in the U.S. Navy, and he has held numerous positions within the Pentagon, Capitol Hill (appropriations), and Energy Department.

    Competing for talent in government – aligning strategy and human capital

    Crafting policy is easy. Implementation and execution via government projects and programs is the hard part.

    • Dec. 1, 2014
  18. A former scientist with Sandia National Labs was sentenced for bringing a government laptop on a trip to China and lying about it to security officials. Sandia National Labs image

    Sandia scientist gets prison term for taking DOE laptop to China

    Jianyu Huang was indicted in 2012 for using U.S. government equipment to do research for Chinese institutions and lying to officials.

    • Nov. 26, 2014
  19. Patricia Niehaus is national president of the Federal Managers Association and chief of labor and employee relations at Travis Air Force Base. Courtesy Photo

    Military leading civilians: Avoiding common mistakes

    Civilian agencies are not much like military organizations, especially when unions are involved.

    • Nov. 26, 2014
  20. Marc Pearl is president and CEO of the Homeland Security & Defense Business Council.

    Maritime security needs more attention

    Air travel and mass transit dominate the public's homeland security consciousness, but should not.

    • Nov. 26, 2014
  21. Michael Fischetti is the Executive Director of the National Contract Management Association. Jenifer Morris

    Acquisition of the future: A realistic today for a better tomorrow

    Can we imagine a technological future in acquisition overcoming today's impediments while simultaneously providing great solutions?

    • Nov. 26, 2014
  22. The Defense Department's new cloud strategy, charting a course now that DISA is no longer the cloud broker, has been delayed. Army

    New DoD cloud policy delayed to early December

    Policy will speed cloud procurement while clarifying the roles of DISA and Office of the CIO.

    • Nov. 25, 2014
  23. Jennifer Sakole is the principal analyst for Federal Information Solutions at Deltek. Her experience spans 20 years in the federal market in various roles including proposal writer, pricing analyst, marketing manager and account manager. She has been with INPUT and Deltek for over a decade.

    SEWP IV tops list for service-disabled veterans

    A look at the GWACs and other contracts that are doing the most for SDVOBs.

    • Nov. 25, 2014
  24. A former Navy nuclear systems administrator was sentenced Nov. 21 for hacking into restricted systems and releasing personal information of service members. MC2 Gary A Prill/U.S. Navy

    System admin sentenced for hacking Navy database

    Former Navy nuclear systems administrator gets two years for exposing information of 222,000 personnel.

    • Nov. 24, 2014
  25. Mark Norton (left), DoD senior systems engineer, said derived credentials won't replace CAC but will simplify sending secure emails on mobile devices. Thomas Brown/Gannett Government Media Corp

    Derived credentials to roll out across DoD by July 2015

    The credentials allow mobile devices to send secure emails without need for a common access card to authenticate the user.

    • Nov. 21, 2014
  26. Goodrich

    Microsoft 365 first cloud email to gain FedRAMP approval

    With ATO, partner InfoReliance will start migrating Health and Human Services' email to the cloud.

    • Nov. 21, 2014
  27. Chris Cummiskey is the CEO of Cummiskey Strategic Solutions LLC and a former Acting Under Secretary for Management at DHS. Courtesy

    DHS making strides to improve acquisition

    Secretary Jeh Johnson and former Under Secretaries for Management Elaine Duke and Rafael Borras have vastly improved DHS's ability to successfully manage large-scale acquisitions.

    • Nov. 20, 2014
  28. Rafael Borrás is a Senior Advisor at A.T. Kearney. Previously he was Under Secretary for Management and Acting Deputy Secretary of the Department of Homeland Security. DHS

    Government agencies should adopt enterprise-level risk management programs

    The corporate world can teach the government a thing or two about risk strategies.

    • Nov. 19, 2014
  29. Marc Marlin is a director at the technology solutions and aerospace/defense investment bank KippsDeSanto & Co. Courtesy / DC Photographer - Mark Finkensta

    Large companies with big appetites for M&A

    Public companies looking for acquisition targets are thirsty for deals that move the needle financially.

    • Nov. 18, 2014
  30. Doug Bourgeois is vice president of end user computing, U.S. public sector, at VMware. Courtesy

    Mobile computing done right: Not the risk we suspected

    For many agencies, the conventional wisdom about the connection between mobility and security is off the mark.

    • Nov. 17, 2014
  31. Phase II of the Continuous Diagnostics and Mitigation program builds on the identity, credential and access management side of cybersecurity, including personal identity verification cards (shown) and authentication. Kendra Fulton/ / Air Force

    CDM Phase II centers on monitoring user privileges, activities

    'Least privilege and infrastructure integrity' is the watchword for the latest cybersecurity push.

    • Nov. 17, 2014
  32. The State Department is the most recent federal agency to admit to a breach of its cyber networks. Wikimedia Commons

    State Department hit in cyberattack that also compromised White House

    State Department's email system shut down this weekend to shore up affected network.

    • Nov. 17, 2014
  33. Editorial: The millennial challenge

    Survey reveals the depths of the government's difficulties in retaining young employees.

    • Nov. 17, 2014
  34. Veteran Affairs CIO Stephen Warren noted that all veteran data compromised in October was the result of human error, not cyberattacks. Colin Kelly/Staff

    Cybersecurity about people, not technology, VA numbers show

    Leaks of personally identifiable information are more likely to come through lost devices or mishandled paperwork than hacking attempts.

    • Nov. 17, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!

See all Video

Top Video Picks