To stop the tens of thousands of cyber attacks against them each year, federal agencies are turning to continuous monitoring, which uses big data analytics to detect potential threats.
ALL GOVERNMENT BUSINESS COUNCIL POSTS
DoD is ahead of the curve in continuous diagnostics & mitigation (CDM), but is its data infrastructure ready for the Three V's?
Just months before its December drawdown deadline, the military’s retrograde operations still face considerable hurdles
Ever since the fluorescent cubicle seclusion model co-opted the souls of designers in the 1960s, the convention has had few challengers-- until now.
Although management and security challenges remain, mobility could be key for attracting innovative employees.
Adapting to a more commercialized defense acquisition process will pit DoD's efforts to maintain control over intellectual property against the pressures of the global marketplace.
While improving cloud security continues to be an important theme as the world prepares for the Internet of Things, human factors --not a direct breach of Apple’s systems-- were the likely cause of the leak.
The Pentagon’s updated acquisition reform initiative emphasizes technological innovation, but its efforts to improve communication among stakeholders are at least as important.
Technological and process failures have resulted in preventable tragedy and pose a threat to bridge safety nationwide.
More than two thirds of federal IT spending goes to legacy system maintenance. How can agencies reduce this cost while meeting demands for more agile operations? The answer may lie in reassessing their network acquisition model.