Ideas
Post-Megabreaches, Feds Should Focus on Third Party Risk
Continuous monitoring of third parties and reducing reliance on paper-based risk assessment will help address some of the root causes for the recent hacks on the government.
Ideas
In the Future, We’ll All Use Our Phones to Identify Ourselves
The most successful mobile identity services highly depend on collaboration between public authorities, banks, telecom operators and the private sector.
Ideas
After the OPM Breach, It’s Time for IT Organizations to be Accountable
Modernized technology and formal standards like FISMA won’t be enough -- mindsets must change, too.
Ideas
Why Chief Data Officers Should Really be Chief Digital Officers
Having a chief data officer is akin to the Army having a chief bullet officer or hospitals having a chief bandage officer.
Ideas
Post-OPM Hack, An Opportunity to Retool Encryption
Redefining encryption in a more holistic manner can be done with the proper technologies and policies in place – even for something as old as a COBOL legacy.
Ideas
OPM Data Breach: What Needs to Happen Now
Given that OPM handles records for federal employees, including those obtaining security clearances, the damage can potentially go beyond financial crimes.
Ideas
4 Top Challenges for Federal CIOs
Cybersecurity, data management and culture remain roadblocks for agency CIOs.
Ideas
6 Reasons Your Agency Needs an App Store
Does your agency have an enterprise app store? If not, then consider these six benefits to adoption.
Ideas
Governments Around the World Join Data-as-a-Utility Revolution
The new public sector push to digitize says digital infrastructure is now just as important as the physical infrastructure of government.
Ideas
OPM Hack: Why Email Notification Makes a Bad Situation Even Worse
By using a third party to manage data breach communication, OPM has now, in essence, provided phishers with a blueprint for creating an attack.
Ideas
Here's What You Can Do to Secure Your Network as the Internet of Everything Nears
A “network as a sensor” approach can help IT security teams leverage mobile, cloud and IoE endpoints to increase transparency.
Ideas
5 Things You Need To Know About the USA Freedom Act
Its predecessor, the Patriot Act, garnered outrage and changed security policy globally. What should we expect from the Freedom Act, hastily passed last week?
Ideas
How to Secure WordPress in 10 Steps
The mitigations needed to secure a WordPress system and fortify it from attacks are many.
Ideas
10 Facts about Federal Websites
How many sites are reachable via HTTPS and how many are powered by open source?
Ideas
4 Things to Consider when Revamping Agency Processes
As agencies continue to balance budget constraints with increasing mission scope, continued optimization of business processes may prove a fruitful path.
Ideas
DATA Act at Year 1: In Need of a Growth Hormone
For the first time, the DATA Act has made it someone's job to define, and later enforce, common standards that will allow users to match and search across financial, budget and award reports.
Ideas
Agency CIOs Need to Be Aware of the Dangers of Consumer Tech
Agency CIOs must be cautious when procuring IT products developed for consumers.
Ideas
Does FITARA Guidance Go Far Enough in Optimizing Software Licenses?
Here are the four levels of software license optimization maturity -- currently in use by private industry -- can could ferret out the billions of dollars of waste in federal software spend.
Ideas
5 Ways to Get a Leg Up on FITARA
Although the impact on IT decision-making processes remains unclear, federal IT leaders should consider how FITARA can create an opportunity for positive change in IT governance.
Ideas