You will be redirected to the page you want to view in  seconds.

 IT management

  1. A former scientist with Sandia National Labs was sentenced for bringing a government laptop on a trip to China and lying about it to security officials. Sandia National Labs image

    Sandia scientist gets prison term for taking DOE laptop to China

    Jianyu Huang was indicted in 2012 for using U.S. government equipment to do research for Chinese institutions and lying to officials.

    • Nov. 26, 2014
  2. CIA logo

    National Archives backs away from CIA email destruction proposal

    NARA wants to consult further before agency destroys some emails in IT transition.

    • Nov. 26, 2014
  3. The Department of Veteran Affairs issued a RFI for a commercial off-the-shelf scheduling system to integrate with the existing VistA system. fotoedu / Getty Images/iStockphoto

    VA issues RFI for commercial scheduling system

    Department looking to replace system that left veterans waiting for needed care.

    • Nov. 24, 2014
  4. Mark Norton (left), DoD senior systems engineer, said derived credentials won't replace CAC but will simplify sending secure emails on mobile devices. Thomas Brown/Gannett Government Media Corp

    Derived credentials to roll out across DoD by July 2015

    The credentials allow mobile devices to send secure emails without need for a common access card to authenticate the user.

    • Nov. 21, 2014
  5. Marty Heinrich, director of information management at Array Information Technology.

    5 ways to minimize risk in the cloud

    The migration of information to the cloud is largely regarded as a next major step in enabling organizations to work faster, cheaper and more efficiently.

    • Nov. 18, 2014
  6. The State Department is the most recent federal agency to admit to a breach of its cyber networks. Wikimedia Commons

    State Department hit in cyberattack that also compromised White House

    State Department's email system shut down this weekend to shore up affected network.

    • Nov. 17, 2014
  7. Veteran Affairs CIO Stephen Warren noted that all veteran data compromised in October was the result of human error, not cyberattacks. Colin Kelly/Staff

    Cybersecurity about people, not technology, VA numbers show

    Leaks of personally identifiable information are more likely to come through lost devices or mishandled paperwork than hacking attempts.

    • Nov. 17, 2014
  8. A public-private partnership would put NOAA data -- like this weather photo -- in a public cloud. NASA/NOAA satellite image

    NOAA asks industry to fund open data program

    Private sector wants access to the data and is willing to pay to put it in a public cloud.

    • Nov. 14, 2014
  9. Rep. Elijah Cummings, D-Md., sent letters to several private corporations asking for details on recent cyber breaches. Win McNamee/Getty Images

    Rep. Elijah Cummings requests details on private industry data breaches

    Ranking member of Oversight Committee looking for information to help steer government policy.

    • Nov. 12, 2014
  10. Creating information sharing groups around cyberattacks can help prevent future breaches and mitigate damage from intruders. Cotton Puryear

    NIST weighs pros and cons of cyberattack data-sharing

    Draft guide to sharing information on cyber breaches is open for public comments.

    • Nov. 11, 2014
  11. U.S. Postal Service networks were breached, potentially leaking significant, sensitive information about employees, as well as some customer data. Kevork Djansezian/Getty Images

    Cyber attack exposes personal information of 800K Postal Service employees

    Intrusion compromised important employee data, including Social Security numbers, and some consumer information.

    • Nov. 10, 2014
  12. Airmen check a launch control center panel during missile launch procedures training at Vandenberg Air Force Base, Calif. Air Force Global Strike Command announced today that the service's 45 missile alert facilities will now feature wireless Internet. Staff Sgt. Jonathan Snyder / Air Force

    Air Force missile sites to get wi-fi

    Internet service at remote locations will provide airmen access for morale and recreational purposes, officials say.

    • Nov. 7, 2014
  13. OPM seeks to learn the 'DNA of the federal cybersecurity workforce,' says Lucy Antone. SAUL LOEB / AFP/Getty Images

    Cybersecurity codes being added to all federal job descriptions

    OPM looking to have every position coded by the end of 2015.

    • Nov. 7, 2014
  14. The neuromorphic chip made by HRL Laboratories allows this small UAV to learn new information as it operates. 2014 HRL LABORATORIES  All rights reserved.

    Prototype AI chip allows UAV to learn

    DARPA-funded research is leading toward processors that act like brains.

    • Nov. 6, 2014
  15. Minor deficiencies add up to significant weaknesses at SSA

    Social Security Administration's annual cybersecurity audit shows progress but more is needed.

    • Nov. 5, 2014
  16. An Inspector General review of Energy Department's systems showed persistent cybersecurity issues. Sheila Vemmer/staff

    IG: Energy Department systems exposed by critical weaknesses

    Annual cybersecurity report shows some progress but a number of significant deficiencies.

    • Nov. 4, 2014
  17. The Census Bureau is testing a new app for enumerators to use during the upcoming 2020 count. U.S. Census Bureau

    Census looking at BYOD options for 2020 count

    Bureau is piloting a new app now in preparation for the upcoming decennial census.

    • Nov. 3, 2014
  18. A survey of government IT professionals finds that training to prevent cyber security threats is an investment priority for more than 60 percent of federal civilian and defense/military organizations. Fort Meade Alliance

    Survey: Cybersecurity priorities shift to insider threats

    Federal IT decision-makers now more concerned with 'misuse' than malware.

    • Nov. 3, 2014
  19. Poor inventories, shifting definitions make the success of the Federal Data Center Consolidation Initiative hard to measure. NASA

    Data center consolidation efforts hampered by poor inventories

    Agencies are reporting significant cost savings, but they should be higher.

    • Oct. 31, 2014
  20. Chris Hamm took over as FEDSIM director on Nov. 1, 2014. Photo courtesy GSA

    Hamm tapped for new FEDSIM director

    Former deputy director brings 15 years of acquisition experience at GSA.

    • Oct. 31, 2014
  21. Press Secretary Josh Earnest said a recent breach of the White House's unclassified network caused minor inconvenience to staffers. Mark Wilson/Getty Images

    White House cyber breach one example of 'daily' attacks

    While no sensitive data was exfiltrated, the incursion underscores importance of constant monitoring.

    • Oct. 30, 2014
  22. An air traffic controller works inside an airport tower simulator. The Federal Aviation Administration has the largest civilian agency IT budget request in the 2015 budget, accounting for 8 percent of the total civil IT request. Getty Images

    IT spending forecast: Slow growth ahead

    Civilian agency growth will slightly outpace that of defense-related agencies, predicts TechAmerica.

    • Oct. 29, 2014
  23. Guinness World Records representative presents the world record certificate for the fastest integrated circuit amplifier to a DARPA and Northrop Grumman team. Northrop Grumman Corp.

    Guinness recognizes DARPA breakthrough

    New terahertz circuit promises to open up new areas of research and application

    • Oct. 29, 2014
  24. Sujey Edward is a Vice President of Salient Federal Solution's Agile Center of Excellence. Photography by: Ron Aira

    Pick the tough problem for your Agile pilot

    Test runs should mirror the real world, where projects are often difficult and complicated.

    • Oct. 27, 2014
  25. Soldiers working with civilians from PEO C3T install commercial IP packages at the Army's Landstuhl, Germany, Regional Hub Node. The node will be the hub for the communications network in support of the Operational United Assistance, aiding the response to the Ebola outbreak in West Africa. U.S. Army

    Army setting up comms for Ebola response in West Africa

    The Army is working to coordinate crisis response in Liberia

    • Oct. 27, 2014
  26. Centers for Medicare and Medicaid Services Administrator Marilyn Tavenner, shown testifying on's initial enrollment troubles, has overseen a site and application process revamp. Mark Wilson/Getty Images preps for onslaught during open enrollment

    Overhauled site will face more consumers than ever before beginning Nov. 15.

    • Oct. 24, 2014
  27. SEWP IV contracts can be extended while SEWP V protests are decided, according to Program Manager Joanne Woytek. Rick Kozak/Federal Times

    Protests delay implementation of SEWP V contracts

    GAO is reviewing four bid protests for NASA's IT GWAC.

    • Oct. 24, 2014
  28. DHS Federal Network Resilience Director John Streufert gave a revised timeline for CMD solicitations and awards. Mike Morones/Staff

    Remaining CDM solicitations delayed to December and beyond

    Majority of contract award announcements expected by August.

    • Oct. 23, 2014
  29. Blake Hall (left), founder and CEO of, and Kimberley Little Sutherland (right), senior director of market planning for identity management for LexisNexis. Photos courtesy and LexisNexis

    ID management secondary focus of executive order

    Third section of an E.O. on payment cards includes mandates for securing access to citizen data.

    • Oct. 23, 2014
  30. Tech expert Ashkan Soltani will be joining the FTC as chief technologist in November. Chip Somodevilla/Getty Images

    Investigative reporter to join FTC as chief technologist

    Former reporter and technical expert Ashkan Soltani to return to FTC in November.

    • Oct. 23, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!