You will be redirected to the page you want to view in  seconds.


  1. A former scientist with Sandia National Labs was sentenced for bringing a government laptop on a trip to China and lying about it to security officials. Sandia National Labs image

    Sandia scientist gets prison term for taking DOE laptop to China

    Jianyu Huang was indicted in 2012 for using U.S. government equipment to do research for Chinese institutions and lying to officials.

    • Nov. 26, 2014
  2. Patricia Niehaus is national president of the Federal Managers Association and chief of labor and employee relations at Travis Air Force Base. Courtesy Photo

    Military leading civilians: Avoiding common mistakes

    Civilian agencies are not much like military organizations, especially when unions are involved.

    • Nov. 26, 2014
  3. Marc Pearl is president and CEO of the Homeland Security & Defense Business Council.

    Maritime security needs more attention

    Air travel and mass transit dominate the public's homeland security consciousness, but should not.

    • Nov. 26, 2014
  4. Michael Fischetti is the Executive Director of the National Contract Management Association. Jenifer Morris

    Acquisition of the future: A realistic today for a better tomorrow

    Can we imagine a technological future in acquisition overcoming today's impediments while simultaneously providing great solutions?

    • Nov. 26, 2014
  5. The Defense Department's new cloud strategy, charting a course now that DISA is no longer the cloud broker, has been delayed. Army

    New DoD cloud policy delayed to early December

    Policy will speed cloud procurement while clarifying the roles of DISA and Office of the CIO.

    • Nov. 25, 2014
  6. Jennifer Sakole is the principal analyst for Federal Information Solutions at Deltek. Her experience spans 20 years in the federal market in various roles including proposal writer, pricing analyst, marketing manager and account manager. She has been with INPUT and Deltek for over a decade.

    SEWP IV tops list for service-disabled veterans

    A look at the GWACs and other contracts that are doing the most for SDVOBs.

    • Nov. 25, 2014
  7. A former Navy nuclear systems administrator was sentenced Nov. 21 for hacking into restricted systems and releasing personal information of service members. MC2 Gary A Prill/U.S. Navy

    System admin sentenced for hacking Navy database

    Former Navy nuclear systems administrator gets two years for exposing information of 222,000 personnel.

    • Nov. 24, 2014
  8. Goodrich

    Microsoft 365 first cloud email to gain FedRAMP approval

    With ATO, partner InfoReliance will start migrating Health and Human Services' email to the cloud.

    • Nov. 21, 2014
  9. Mark Norton (left), DoD senior systems engineer, said derived credentials won't replace CAC but will simplify sending secure emails on mobile devices. Thomas Brown/Gannett Government Media Corp

    Derived credentials to roll out across DoD by July 2015

    The credentials allow mobile devices to send secure emails without need for a common access card to authenticate the user.

    • Nov. 21, 2014
  10. Chris Cummiskey is the CEO of Cummiskey Strategic Solutions LLC and a former Acting Under Secretary for Management at DHS. Courtesy

    DHS making strides to improve acquisition

    Secretary Jeh Johnson and former Under Secretaries for Management Elaine Duke and Rafael Borras have vastly improved DHS's ability to successfully manage large-scale acquisitions.

    • Nov. 20, 2014
  11. Rafael Borrás is a Senior Advisor at A.T. Kearney. Previously he was Under Secretary for Management and Acting Deputy Secretary of the Department of Homeland Security. DHS

    Government agencies should adopt enterprise-level risk management programs

    The corporate world can teach the government a thing or two about risk strategies.

    • Nov. 19, 2014
  12. Marc Marlin is a director at the technology solutions and aerospace/defense investment bank KippsDeSanto & Co. Courtesy / DC Photographer - Mark Finkensta

    Large companies with big appetites for M&A

    Public companies looking for acquisition targets are thirsty for deals that move the needle financially.

    • Nov. 18, 2014
  13. Doug Bourgeois is vice president of end user computing, U.S. public sector, at VMware. Courtesy

    Mobile computing done right: Not the risk we suspected

    For many agencies, the conventional wisdom about the connection between mobility and security is off the mark.

    • Nov. 17, 2014
  14. Phase II of the Continuous Diagnostics and Mitigation program builds on the identity, credential and access management side of cybersecurity, including personal identity verification cards (shown) and authentication. Kendra Fulton/ / Air Force

    CDM Phase II centers on monitoring user privileges, activities

    'Least privilege and infrastructure integrity' is the watchword for the latest cybersecurity push.

    • Nov. 17, 2014
  15. The State Department is the most recent federal agency to admit to a breach of its cyber networks. Wikimedia Commons

    State Department hit in cyberattack that also compromised White House

    State Department's email system shut down this weekend to shore up affected network.

    • Nov. 17, 2014
  16. Editorial: The millennial challenge

    Survey reveals the depths of the government's difficulties in retaining young employees.

    • Nov. 17, 2014
  17. Veteran Affairs CIO Stephen Warren noted that all veteran data compromised in October was the result of human error, not cyberattacks. Colin Kelly/Staff

    Cybersecurity about people, not technology, VA numbers show

    Leaks of personally identifiable information are more likely to come through lost devices or mishandled paperwork than hacking attempts.

    • Nov. 17, 2014
  18. Rep. Elijah Cummings, D-Md., sent letters to several private corporations asking for details on recent cyber breaches. Win McNamee/Getty Images

    Rep. Elijah Cummings requests details on private industry data breaches

    Ranking member of Oversight Committee looking for information to help steer government policy.

    • Nov. 12, 2014
  19. Michael Fischetti is the Executive Director of the National Contract Management Association. Jenifer Morris

    In defense of the FAR

    Proposals to change the primary contracting regulation in an effort to improve procurement are misplaced.

    • Nov. 11, 2014
  20. Howard Risher is a consultant and writer on federal pay and performance issues. He was the managing consultant for the studies leading to the 1990 Federal Employees Pay Comparability Act and is the author of 'Planning Wage and Salary Programs.'

    Homeland Security 'failings' highlight a broader problem

    Calls to dissolve DHS for its perceived blunders and abuses are missing the point.

    • Nov. 11, 2014
  21. Creating information sharing groups around cyberattacks can help prevent future breaches and mitigate damage from intruders. Cotton Puryear

    NIST weighs pros and cons of cyberattack data-sharing

    Draft guide to sharing information on cyber breaches is open for public comments.

    • Nov. 11, 2014
  22. James Windle works at the National Renewable Energy Laboratory and has worked at the Office of Management and Budget, the House Committee on Appropriations, and multiple federal agencies. The views expressed are his own and do not represent those of NREL or the U.S. Department of Energy. Courtesy Photo

    Post-election budgeting

    Another CR is likely this year, but what happens when a new Congress is in place?

    • Nov. 11, 2014
  23. Janet Hale is former undersecretary for management at the Department of Homeland Security. Courtesy

    Congressional oversight of DHS: It's time for an overhaul

    Lawmakers are providing too much of a good thing with their close eye on the department.

    • Nov. 11, 2014
  24. U.S. Postal Service networks were breached, potentially leaking significant, sensitive information about employees, as well as some customer data. Kevork Djansezian/Getty Images

    Cyber attack exposes personal information of 800K Postal Service employees

    Intrusion compromised important employee data, including Social Security numbers, and some consumer information.

    • Nov. 10, 2014
  25. Airmen check a launch control center panel during missile launch procedures training at Vandenberg Air Force Base, Calif. Air Force Global Strike Command announced today that the service's 45 missile alert facilities will now feature wireless Internet. Staff Sgt. Jonathan Snyder / Air Force

    Air Force missile sites to get wi-fi

    Internet service at remote locations will provide airmen access for morale and recreational purposes, officials say.

    • Nov. 7, 2014
  26. Illegal e-commerce sites hide from law enforcement on the 'Dark Web.' Getty

    Police take down Dark Web markets around the globe

    Police in 17 countries arrested at least 17 website administrators, vendors and cybercriminals in a massive operation.

    • Nov. 7, 2014
  27. OPM seeks to learn the 'DNA of the federal cybersecurity workforce,' says Lucy Antone. SAUL LOEB / AFP/Getty Images

    Cybersecurity codes being added to all federal job descriptions

    OPM looking to have every position coded by the end of 2015.

    • Nov. 7, 2014
  28. Brendan Goode, a key figure in the Einstein program, to leave DHS

    The department confrms that Goode will leave for the private sector later this month.

    • Nov. 7, 2014
  29. Philip R. Reitinger is the president of VisionSpear LLC and former deputy undersecretary for the National Protection and Programs Directorate at the Department of Homeland Security. Courtesy Photo

    Time to celebrate a cybersecurity success

    Good news about cybersecurity too often gets drowned out by the bad.

    • Nov. 6, 2014
  30. Kimberley Williams is chief strategist for public sector at Informatica. Williams has over 20 years of implementation, technical sales and marketing experience from enterprise software giants including Curam Software, PeopleSoft, Oracle and Accenture. David Hartcorn

    Data First: Five tips to reduce the risk of a breach

    With hackers and identity thieves to worry about, the holiday season not all joy and jingle bells.

    • Nov. 6, 2014
  31. Howard Risher is a consultant and writer on federal pay and performance issues. He was the managing consultant for the studies leading to the 1990 Federal Employees Pay Comparability Act and is the author of 'Planning Wage and Salary Programs.'

    Top FEVS take-away: Take performance management seriously

    Two out of three federal employees are dissatisfied with the way their performance is managed

    • Nov. 5, 2014
  32. Minor deficiencies add up to significant weaknesses at SSA

    Social Security Administration's annual cybersecurity audit shows progress but more is needed.

    • Nov. 5, 2014
  33. Michael Fischetti is the Executive Director of the National Contract Management Association. Jenifer Morris

    A noble contracting program many never heard of

    AbilityOne provides opportunities for the disabled while fulfilling government needs.

    • Nov. 5, 2014
  34. An Inspector General review of Energy Department's systems showed persistent cybersecurity issues. Sheila Vemmer/staff

    IG: Energy Department systems exposed by critical weaknesses

    Annual cybersecurity report shows some progress but a number of significant deficiencies.

    • Nov. 4, 2014
  35. Charles (Chuck) Brooks serves as Vice President and Client Executive for DHS at Xerox. Previously, he served in government at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. Courtesy

    The DHS's vital role in confronting the threat of pandemics and bioterrorism

    Though only a decade old, DHS plays an important role in bio-surveillance for infectious disease response, and in countering bio-terrorism.

    • Nov. 4, 2014
  36. Scott Quehl leads Accenture Federal Services Strategic Government Efficiency offering. He formerly served as Chief Financial Officer and Assistant Secretary for Administration at the U.S. Department of Commerce.

    Managing the Journey: Steps federal agencies can take to ease transformational change

    Agencies are increasingly realizing a need for large-scale transformational change to accomplish their missions.

    • Nov. 4, 2014
  37. The Census Bureau is testing a new app for enumerators to use during the upcoming 2020 count. U.S. Census Bureau

    Census looking at BYOD options for 2020 count

    Bureau is piloting a new app now in preparation for the upcoming decennial census.

    • Nov. 3, 2014
  38. Lt. Gen. Kenneth Minihan is the former director of the National Security Administration and the Defense Intelligence Agency.

    Federal mobile platforms need newer, stricter protocols

    The marriage of mobile and cloud requires a new approach to security.

    • Nov. 3, 2014
  39. Lua is designed to allow teams to communicate in a secure environment. Lua

    Mobile efficiency and security: Finding the balance

    The days of mobile as an afterthought are long past, but agencies still struggle to make implementations user-friendly yet still secure.

    • Nov. 3, 2014
  40. A survey of government IT professionals finds that training to prevent cyber security threats is an investment priority for more than 60 percent of federal civilian and defense/military organizations. Fort Meade Alliance

    Survey: Cybersecurity priorities shift to insider threats

    Federal IT decision-makers now more concerned with 'misuse' than malware.

    • Nov. 3, 2014
  41. Keith Trippie is CEO of the Trippie Group and a former Department of Homeland Security Senior Executive. Courtesy Photo

    Cyber Vision: Enhancing our nation's cyber wellness through prevention

    With sophisticated cyber attacks escalating, wearable technologies hitting the market and millions of new operational sensors set to deploy, does anyone think regulation alone can solve this problem?

    • Nov. 3, 2014
  42. Marc Marlin is a director at the technology solutions and aerospace/defense investment bank KippsDeSanto & Co. Courtesy / DC Photographer - Mark Finkensta

    Takeaways from the T4NG Industry Day

    On October 6, the Department of Veterans Affairs held its industry day for the next generation of the Transformation Twenty-One Total Technology (T4NG) contract for the procurement of IT systems, health IT, and telecommunications hardware and software to

    • Nov. 3, 2014
  43. Kshemendra Paul, program manager for the Information Sharing Environment, in Washington, D.C., on Wednesday, September 4, 2013. (Mike Morones/Staff) Mike Morones/Staff

    The ISE at 10

    Information sharing is a problem that is never solved, but the government's ambitious attempt, launched in the wake of 2001's terror attacks, has taken some big strides.

    • Nov. 3, 2014
  44. Editorial: Ideas for fixing a failing relationship

    A big problem in government today is the fractured relationship it has with its vendor base.

    • Nov. 3, 2014
  45. Linda Springer is the former director of the Office of Personnel Management and former controller at the Office of Management and Budget. Courtesy

    A big update for Circular A-123

    For its tenth birthday, OMB's document on internal management controls may gain enterprise risk management concepts.

    • Nov. 3, 2014
  46. Sens. Dianne Feinstein and Saxby Chambliss have urged the U.S. Chamber of Commerce to push for a cybersecurity bill. Alex Wong/ / Getty Images

    Charm Offensive: Senate intel leaders push for US Chamber's help on cyber bill

    Feinstein, Chambliss bring a bipartisan plea to the chamber's Washington headquarters.

    • Oct. 30, 2014
  47. 'I'm not interested in anybody writing a blank check for US Cyber Command or the National Security Agency,' said ADM Mike Rogers, who heads both groups. Mark Wilson / Getty Images

    NSA chief: 'I don't want privacy information'

    As industry and privacy advocates fret about cybersecurity legislation, cyber leader seeks to reassure.

    • Oct. 29, 2014
  48. Tyler Robinson is the Chairman of the Executive Board for Young Government Leaders, and Director of the Portfolio Risk & Reporting Division at the Export-Import Bank of the United States. Courtesy Photo

    Sleep: It does a manager good

    To be more productive on the job, spend more time in dreamland.

    • Oct. 28, 2014
  49. Phyllis Schneck is Deputy Under Secretary for Cybersecurity and Communications at the Department of Homeland Security. File

    Improving cybersecurity for small and medium-sized businesses

    Like their larger counterparts, small and medium businesses frequently house sensitive data, but are not always as able to secure it.

    • Oct. 28, 2014
  50. Michael Kushin is senior vice president at CACI International Inc. Courtesy Photo

    DHS enhanced scanning authority is a good start

    Congress must now step up to pass legislation that gives the department clear guidance.

    • Oct. 28, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!