recommended reading

author archives

Results 41-50 of 81

Tony Scott: Federal Government Needs to Move to a Customer-Centric IT Model

October 25, 2016 The federal government needs to rethink how it purchases and deploys technology, making those decisions irrespective of agencies’ organizational structures, according to federal CIO Tony Scott. The top federal IT official also said that the government, not to mention society at large, needs to change the conversation around cybersecurity: The...

Feds Want to Move Further Into the Cloud, but Face Security Concerns

October 25, 2016 Federal IT decision-makers whose agencies have adopted cloud computing expect to invest more in cloud computing next year, but clear barriers to that investment still remain,especially in terms of security, according to a MeriTalk survey. The survey, “Destination Cloud: The Federal and SLED Cloud Journey,” which was released last month,...

NSA, DHS and DOJ Highlight Security Threats Posed by IoT

October 25, 2016 The Internet of Things (IoT) is expected to continue to grow in the years ahead, with research firm Gartner predicting that the number of connected devices worldwide will skyrocket form 6.4 billion in 2016 to 20.8 billion in 2020. For the federal government, all of those Internet connections present both...

ELC 2016: Artificial Intelligence Can Help Analyze Security Threat Data

October 25, 2016 The federal government is awash in data related to cybersecurity threats, but needs better tools to make sense of all of that information. It may get some help in the cloud, according to federal officials and cybersecurity experts, but artificial intelligence and cognitive computing technologies may hold the key to...

How Fannie Mae Used DevOps to Improve Its IT Operations

October 25, 2016 Fannie Mae, the government-sponsored housing giant that provides liquidity to the mortgage market, does not want to be thought of as a giant — or act like one. And it’s using DevOps to transform itself. A DevOps mythology is one that encourages software developers to work with IT operations staff...

Presidential Transition Helps Lay the Foundation for New Era of Tech Policy

October 12, 2016 The 2016 presidential election is 33 days away, but the presidential transition process has been underway for months. The General Services Administration and nongovernmental organizations are assisting the presidential campaigns on technology policy and operations, so that on Nov. 9 the winning campaign’s transition team can hit the ground running,...

FedRAMP Scores a Cloud Victory, as Microsoft Gets a Speedy Approval

October 12, 2016 FedRAMP Accelerated is finally paying off. The General Services Administration’s Federal Risk and Authorization Management Program (FedRAMP) last month approved the first cloud service provider to work with federal agencies as part of the FedRAMP Accelerated program, which is designed to speed up the authorization process. The Joint Authorization Board...

How Treasury’s Bureau of Engraving and Printing Is Benefiting from the Cloud

October 12, 2016 The Treasury Department’s Bureau of Engraving and Printing designs the physical object used most by Americans: paper money. But the agency itself is moving beyond the physical world and virtualizing its operations by moving applications to the cloud. BEP put its enterprise resource planning (ERP) system in the cloud back...

NSA and OPM Turn to Behavioral Analytics to Combat Insider Threats

October 12, 2016 In the post-Snowden world, federal agencies know they need to defend against the real possibilities of insider threats and data breaches. Agencies are increasingly focusing on data analytics of user behavior as a way to prevent internal breaches. As the White House, the Department of Homeland Security and the federal...

How the Commerce Department Sees Cybersecurity Differently

October 2, 2016 When federal agencies first began to make cybersecurity a priority, many adopted a “castle and moat” approach, notes Rod Turk, CISO at the Commerce Department. Even if there were weaker defenses inside, a strong perimeter defense would keep an enterprise safe. Today though, Turk said, agencies need to know about...