Nextgov - Tech Insider Expert Blog on the State of Federal Technologyen-usThu, 30 Jul 2015 15:03:24 -04004 Myths of Citizen Experience is required for success is to abandon old myths and fundamentally shift our thinking.Josh PlaskoffThu, 30 Jul 2015 15:03:24 -0400 - Tech Insidervenimo/Shutterstock.comThe Future-Forward Cybersecurity Fix U.S. government is playing catch-up on security primarily because it has not been able to keep up with the advances in technology over the last decade.Chris EdwardsWed, 29 Jul 2015 10:06:34 -0400 - Tech Insider4 Steps to Boost Records Management Practices employees and managers aren't confident about what actually constitutes a record.April ChenTue, 28 Jul 2015 15:45:11 -0400 - Tech Insiderjdwfoto/Shutterstock.comGovernment Hacked Yet Again. It's About Time Federal Cybersecurity Became a National Issue aftermath of the OPM hack, with all its humiliating details of ignored warnings, has shown the federal government is both stubbornly slow to fix mistakes and woefully understaffed with cybersecurity experts.Darren GuccioneSat, 25 Jul 2015 14:00:00 -0400 - Tech Insider Sean Pavone/Shutterstock.comHow to Secure an Increasingly Mobile Federal Workforce strong authentication by using derived PIV credentials may be an agency’s best and first line of defense.Chris EdwardsTue, 21 Jul 2015 12:56:19 -0400 - Tech Insidermotestockphoto/Shutterstock.com5 Questions to Ask Before Redesigning Your Agency Website embarking on this potentially time-consuming and costly endeavor, agency decision-makers need to ensure their teams have the right information.Jose Carlos LinaresMon, 20 Jul 2015 16:56:12 -0400 - Tech Insiderdencg/Shutterstock.comPost-Megabreaches, Feds Should Focus on Third Party Risk monitoring of third parties and reducing reliance on paper-based risk assessment will help address some of the root causes for the recent hacks on the government.Jacob OlcottThu, 09 Jul 2015 13:06:20 -0400 - Tech InsiderEugene Sergeev/Shutterstock.comIn the Future, We’ll All Use Our Phones to Identify Ourselves most successful mobile identity services highly depend on collaboration between public authorities, banks, telecom operators and the private sector.Neville PattinsonMon, 06 Jul 2015 13:09:39 -0400 - Tech InsiderAlexey Boldin/Shutterstock.comAfter the OPM Breach, It’s Time for IT Organizations to be Accountable technology and formal standards like FISMA won’t be enough -- mindsets must change, too.Jeff GouldThu, 02 Jul 2015 10:43:36 -0400 - Tech InsiderA chart of data breaches is shown on Capitol Hill in Washington, Tuesday, June 16, 2015, as witnesses testify before the House Oversight and Government Reform committee's hearing on the Office of Personnel Management data breach. AP Photo/Cliff Owen Why Chief Data Officers Should Really be Chief Digital Officers a chief data officer is akin to the Army having a chief bullet officer or hospitals having a chief bandage officer.Andrew H. LaVanwayWed, 01 Jul 2015 10:51:25 -0400 - Tech Hack, An Opportunity to Retool Encryption encryption in a more holistic manner can be done with the proper technologies and policies in place – even for something as old as a COBOL legacy.Chuck ArcherThu, 25 Jun 2015 14:10:42 -0400 - Tech Insiderwk1003mike/Shutterstock.comOPM Data Breach: What Needs to Happen Now that OPM handles records for federal employees, including those obtaining security clearances, the damage can potentially go beyond financial crimes.Fengmin GongMon, 22 Jun 2015 05:00:00 -0400 - Tech Insiderwk1003mike/Shutterstock.com4 Top Challenges for Federal CIOs, data management and culture remain roadblocks for agency CIOs.George DelPreteFri, 19 Jun 2015 13:18:26 -0400 - Tech Insiderwinui/Shutterstock.com6 Reasons Your Agency Needs an App Store your agency have an enterprise app store? If not, then consider these six benefits to adoption.Jose Carlos LinaresThu, 18 Jun 2015 12:45:37 -0400 - Tech InsiderShutter_M/Shutterstock.comGovernments Around the World Join Data-as-a-Utility Revolution new public sector push to digitize says digital infrastructure is now just as important as the physical infrastructure of government.Kevin MerrittWed, 17 Jun 2015 09:00:00 -0400 - Tech Insidernmedia/Shutterstock.comOPM Hack: Why Email Notification Makes a Bad Situation Even Worse using a third party to manage data breach communication, OPM has now, in essence, provided phishers with a blueprint for creating an attack.Damien HugooWed, 10 Jun 2015 11:12:01 -0400 - Tech Insiderkpatyhka/Shutterstock.comHere's What You Can Do to Secure Your Network as the Internet of Everything Nears “network as a sensor” approach can help IT security teams leverage mobile, cloud and IoE endpoints to increase transparency.Steve MartinoTue, 09 Jun 2015 14:24:52 -0400 - Tech Insidera-image/Shutterstock.com5 Things You Need To Know About the USA Freedom Act predecessor, the Patriot Act, garnered outrage and changed security policy globally. What should we expect from the Freedom Act, hastily passed last week?Ed FerraraFri, 05 Jun 2015 14:03:07 -0400 - Tech InsiderBrandon Bourdages/Shutterstock.comHow to Secure WordPress in 10 Steps mitigations needed to secure a WordPress system and fortify it from attacks are many.Larry G. WlosinskiTue, 02 Jun 2015 11:31:28 -0400 - Tech InsiderGongTo/Shutterstock.com10 Facts about Federal Websites many sites are reachable via HTTPS and how many are powered by open source?Ben BalterTue, 12 May 2015 11:39:20 -0400 - Tech Insider tovovan/Shutterstock.com4 Things to Consider when Revamping Agency Processes agencies continue to balance budget constraints with increasing mission scope, continued optimization of business processes may prove a fruitful path.Darryn GrahamMon, 11 May 2015 13:04:12 -0400 - Tech InsiderTsyhun/Shutterstock.comDATA Act at Year 1: In Need of a Growth Hormone the first time, the DATA Act has made it someone's job to define, and later enforce, common standards that will allow users to match and search across financial, budget and award reports.Hudson Hollister and John MarshallFri, 08 May 2015 09:00:00 -0400 - Tech InsiderGenialbaron/Shutterstock.comAgency CIOs Need to Be Aware of the Dangers of Consumer Tech CIOs must be cautious when procuring IT products developed for consumers.Jeff GouldThu, 07 May 2015 12:28:10 -0400 - Tech Insider bloomua/Shutterstock.comDoes FITARA Guidance Go Far Enough in Optimizing Software Licenses? are the four levels of software license optimization maturity -- currently in use by private industry -- can could ferret out the billions of dollars of waste in federal software spend.Jim RyanTue, 05 May 2015 15:44:34 -0400 - Tech Insiderisak55/Shutterstock.com5 Ways to Get a Leg Up on FITARA the impact on IT decision-making processes remains unclear, federal IT leaders should consider how FITARA can create an opportunity for positive change in IT governance.Kris van Riper and Lon ZanettaTue, 28 Apr 2015 12:56:31 -0400 - Tech Insiderluchunyu/