Architects of the Federal IT Acquisition Reform Act are hopeful the legislation will be wrapped up in the National Defense Authorization Act.
TECH - ALL ARTICLES
How $180 million could improve national security.
Risk-based decision-making describes the tradeoffs an agency makes -- or doesn’t make -- when confronted with a potential cyber vulnerability.
What controls exist to protect privacy and secure records from unauthorized access?
Resiliency is the key to preventing the attackers from finding sensitive information or disrupting activities, experts say.
In just a few years, cloud computing could help aid the search for extraterrestrial life.
The commonwealth's login network could help secure online shopping and other e-commerce services worldwide.
Six federal agencies earned an average of “very poor." HealthCare.gov scored the lowest.
Instead of original data, a structurally similar but obscured version of the data, or “dummy data”, is used for development and testing environments.
The House Oversight and Government Reform Committee and the House Judiciary Committee team up for a joint hearing next week.