recommended reading

author archives

Results 11-20 of 81

What Is the Future of the U.S. Digital Service?

March 17, 2017 It’s arguable that few agencies better exemplified the Obama administration’s approach to technology, innovation and their combination in government than the U.S. Digital Service. Formed as a continuation of the private sector tech experts who helped salvage Healthcare.gov, the USDS has since grown and expanded to become the go-to team...

President Trump’s 2018 Budget Calls for $1.5 Billion Increase in DHS Cyber Funding

March 17, 2017 President Donald Trump is proposing to increase funding for cybersecurity at the Department of Homeland Security by $1.5 billion in his budget outline for fiscal year 2018. The budget outline, a so-called “skinny budget,” is just a high-level outline; a more expansive budget will be released this spring. However, it...

Will IT Modernization Push Greater Adoption of Shared Services at Federal Agencies?

February 14, 2017 The push for IT modernization was one of the key trends in federal technology in 2016 and is expected to remain a hot topic this year. However, while legislative efforts to codify the modernization proposals have stalled, one of the key ideas that the movement championed — shared IT services...

DISA Hunts for New Tech to Protect Against Insider Threats

February 14, 2017 The Defense Information Systems Agency is concerned about insider threats to the Defense Department’s networks and is on the prowl to do something about it. The Pentagon’s unified IT services provider is trying to protect what is known as the Joint Service Provider, or JSP, which combines IT service for...

DHS, FEMA and USDA Officials Urge IT Focus on Outcomes, Risk-Taking

February 14, 2017 The term “digital transformation” gets thrown around a lot these days, says Michael Hermus, chief technology officer at the Department of Homeland Security. What does it actually mean? Hermus, speaking Wednesday at FedScoop’s “Government of the Future” conference in suburban Washington, noted that DHS is most focused on the outcomes...

3 Ways Identity and Access Management Makes Agencies More Efficient and Secure

February 14, 2017 Hackers don't have to force their way into systems anymore — employees increasingly give them access via successful social engineering attacks. To defend against the threats, some agencies are moving away from department-based, stove-piped systems toward identity and access management (IAM), a security discipline that combines identification, authentication and authorization...

FCC, DHS Officials Stress Importance of Cloud, AI as Tech Evolves

February 14, 2017 If federal agencies want to operate smoothly and seamlessly in the coming decades, they must get on board with the cloud. That was a key takeaway from several federal IT leaders at an industry conference this week in suburban Washington. Speaking Wednesday at FedScoop’s “Government of the Future” conference, Federal...

Microsoft Gets the Pentagon’s Highest Cloud Security Rating for Unclassified Data

February 9, 2017 Last month, the Defense Department gave Microsoft’s Azure Government cloud platform its highest certification in terms of security for unclassified data. In a company blog post, Tom Keane, general manager for Microsoft Azure, noted that Azure Government is “the first commercial cloud service to be awarded an Information Impact Level...

OPM Urges Creation of Secure and Modern NBIB to Handle Background Investigations

February 9, 2017 The National Background Investigations Bureau (NBIB) was born out of a scandal at the Office of Personnel Management. Now OPM wants to make sure it has the necessary IT to function properly in securing federal workers’ records. In an exit memo earlier this month, outgoing OPM Director Beth Cobert spelled...

DHS Makes Progress on Improving Information System Security

February 9, 2017 The Department of Homeland Security has made progress on cybersecurity training and improving its information security, the agency’s inspector general said in a report released earlier this month. However, the agency can make additional enhancements to its IT security practices and is still using IT systems without the required authority...