The Pentagon’s new technology “offset” strategy could be the key to achieving its objectives in an era of constrained budgets, but can the military maintain its tech edge in the 21st century?
ALL INSIGHTS POSTS
Exploiting wireless network vulnerabilities for law enforcement purposes is a bad idea.
Four in five federal end users are going outside their IT department for cloud services that can risk their security and skew their budgets. Why are they doing it, and what can your agency do to bring them back from the dark side?
As the 2016 budget begins to loom, agencies have the opportunity to adopt information collection technologies to make better decisions for their finances and their mission.
As agencies simultaneously move to cloud solutions and secure their IT assets, they may consider how these two goals can be more effectively achieved in tandem.
Revelations of phishing attacks that breached Nuclear Regulatory Commission computers showcase the federal government's biggest cybersecurity vulnerability - its own employees.
Privacy is acutely important in the discussion on big health data, but another challenge is prior even to confidentiality concerns.
So your agency has already migrated email and some back office functions to the cloud. Great. But is it ready for the hard stuff?
The new U.S. Digital Service faces some daunting challenges to improving government digital strategy efforts.
Your agency is literally (maybe not literally) drowning in data and it's only going to get worse without serious consideration for its information management strategy.