The Pentagon’s updated acquisition reform initiative emphasizes technological innovation, but its efforts to improve communication among stakeholders are at least as important.
While improving cloud security continues to be an important theme as the world prepares for the Internet of Things, human factors --not a direct breach of Apple’s systems-- were the likely cause of the leak. // flickr user Disney
Technological and process failures have resulted in preventable tragedy and pose a threat to bridge safety nationwide.
More than two thirds of federal IT spending goes to legacy system maintenance. How can agencies reduce this cost while meeting demands for more agile operations? The answer may lie in reassessing their network acquisition model.
The Pentagon’s new technology “offset” strategy could be the key to achieving its objectives in an era of constrained budgets, but can the military maintain its tech edge in the 21st century?
Exploiting wireless network vulnerabilities for law enforcement purposes is a bad idea.
Four in five federal end users are going outside their IT department for cloud services that can risk their security and skew their budgets. Why are they doing it, and what can your agency do to bring them back from the dark side?
As the 2016 budget begins to loom, agencies have the opportunity to adopt information collection technologies to make better decisions for their finances and their mission.
As agencies simultaneously move to cloud solutions and secure their IT assets, they may consider how these two goals can be more effectively achieved in tandem.
Revelations of phishing attacks that breached Nuclear Regulatory Commission computers showcase the federal government's biggest cybersecurity vulnerability - its own employees.
Privacy is acutely important in the discussion on big health data, but another challenge is prior even to confidentiality concerns.