Technological and process failures have resulted in preventable tragedy and pose a threat to bridge safety nationwide.
ALL GOVERNMENT BUSINESS COUNCIL POSTS
More than two thirds of federal IT spending goes to legacy system maintenance. How can agencies reduce this cost while meeting demands for more agile operations? The answer may lie in reassessing their network acquisition model.
The Pentagon’s new technology “offset” strategy could be the key to achieving its objectives in an era of constrained budgets, but can the military maintain its tech edge in the 21st century?
Exploiting wireless network vulnerabilities for law enforcement purposes is a bad idea.
Four in five federal end users are going outside their IT department for cloud services that can risk their security and skew their budgets. Why are they doing it, and what can your agency do to bring them back from the dark side?
As the 2016 budget begins to loom, agencies have the opportunity to adopt information collection technologies to make better decisions for their finances and their mission.
As agencies simultaneously move to cloud solutions and secure their IT assets, they may consider how these two goals can be more effectively achieved in tandem.
Revelations of phishing attacks that breached Nuclear Regulatory Commission computers showcase the federal government's biggest cybersecurity vulnerability - its own employees.
Privacy is acutely important in the discussion on big health data, but another challenge is prior even to confidentiality concerns.
So your agency has already migrated email and some back office functions to the cloud. Great. But is it ready for the hard stuff?