navigation-background arrow-down-circle Reply Icon Show More Heart Delete Icon wiki-circle wiki-square wiki arrow-up-circle add-circle add-square add arrow-down arrow-left arrow-right arrow-up calendar-circle chat-bubble-2 chat-bubble check-circle check close contact-us credit-card drag menu email embed facebook-circle snapchat-circle facebook-square facebook faq-circle faq film gear google-circle google-square googleplus history home instagram-circle instagram-square instagram linkedin-circle linkedin-square linkedin load monitor Video Player Play Icon person pinterest-circle pinterest-square pinterest play readlist remove-circle remove-square remove search share share2 sign-out star trailer trash twitter-circle twitter-square twitter youtube-circle youtube-square youtube

IT Blogs

More

7 steps for a successful IT consolidation [Commentary]

Focusing solely on the technical aspects of consolidation at the expense of human considerations can…

Black Swans: Are you prepared? [Commentary]

We know that Black Swans will emerge. Are you prepared? There’s no excuse not to be; OMB’s new guida…

A new chance at digital transformation [Commentary]

When I served as a federal chief information officer, there was a standing joke in government circle…

Visionaries needed for federal cybersecurity, insider threat programs [Commentary]

The Apollo Guidance Computer had less computing power than the smartphone that’s likely resting in y…

Donald Trump's tweets are now presidential records

Many Twitter users tweak their tweets every day with little to no fanfare. When the president of the…

Management Blogs

More

Moving forward with new management agenda [Commentary]

Effective management practices can increase the chances for success in government reform.

The warrior scholar: Why H. R. McMaster should adopt Kissinger model [Commentary]

Given President Trump’s relationship with current members of the National Security Council and his a…

Project management improving but government lags [Commentary]

For the first time in five years, data shows that across industry sectors, the percentage of project…

Regulatory reform starts with understanding [Commentary]

Acquisition reform has become somewhat of a chaotic practice unto itself. It often complicates more…

Building a 21st century SES [Commentary]

SES is at risk. And that’s not just my opinion. That’s the consensus of some of our federal governme…

Acquisition Blogs

More

Innovating federal contracting: Be careful what you wish for [Commentary]

We’re all aware of — and perhaps have participated in — the criticism of today’s model of contractin…

Fighting federal procurement fraud [Commentary]

In recent years, fraud experts have turned to a hybrid analytical approach to fraud monitoring that…

'To Whom It May Concern' [Commentary]

A new administration is coming to town. This transition will be somewhat unusual, in that none of th…

Top issues going into the new year

What will be the new administration’s acquisition priorities? Speculation opaquely says increased ou…

The coming impact of 'disruptive' technology on acquisition

What legislation, policy and talking points haven’t delivered, technology eventually will.

Homeland Security Blogs

More

Sec Kelly should call for bottom-up review of DHS cyber [Commentary]

We are at an important inflection point in our history when it comes to the benefits and risks of ad…

The cybersecurity priority for DHS in 2017

One area where DHS is certain to continue to assume a special role and profile is cybersecurity.

US Secret Service: Unsung heroes of 2016 election

While challenges persist at the Secret Service, we should all take a moment to be thankful for the e…

How the next administration will reshape DHS

Clinton and Trump have very different positions on homeland security.

Solution to cyber skills shortage: Federal cyber range

Investment in a range could solve the growing labor and skills shortage in the federal cyber workfor…

Business Insights

A federal response to cyber/physical threats

Security professionals must address the functionality and safety of crucial systems.

Obama administration can secure another win for data privacy

The Obama administration should implement the Privacy Shield agreement as soon as possible to addres…

5 steps to successfully implement organizational change

Federal agencies need a change management strategy that involves gathering evidence, meticulously ou…

Agencies need cyber risk strategies for modern adversaries

Implementing traditional cybersecurity defenses alone no longer suffices for today’s agencies. A hol…

Implement black swan modeling to avoid government catastrophes

Agencies need to be prepared for the unknown. No one had ever seen a black swan ... until they had.

Don't Miss

Another step toward a more inclusive workforce

Every year, billions of taxpayer dollars are spent on consulting services, training and software dev…

Army releases cloud computing strategy

Moving to cloud advances the Army's objective to reduce our ownership, operation and sustainment of…

Hashmi: On leaving GSA

Serving at GSA has been an honor. I have worked with incredibly intelligent and hard working leaders…