People
Recommended reading
Innovation is overrated; better security through encryption; executives are the weakest link.
People
The best from the federal blogosphere
5 lessons from military bloggers; an open government-style approach to rule planning; more oil spill data on tap; rescuing migratory birds.
Modernization
'Jointness': The new battlefield watchword in data sharing
Several information-sharing programs, particularly those under DISA, are breaking down silos that have long impeded battlefield coordination.
Cybersecurity
Military wrestles with cyber war battle planning
The military's new consolidated Cyber Command faces unprecedented challenges as it forges the nation's policies and capabilities for cyber defense and war.
People
Watchdogs keep an eye on federal pay, bonuses
The Heritage Foundation and other groups wonder why the federal government puts up with so many highly educated employees.
Modernization
Are cloud and ITIL like oil and water?
What gives when the Information Technology Infrastructure Library advice says seek total control of your technology assets but cloud computing says don’t sweat the small stuff?
Cybersecurity
Global cyber arms race may be brewing
The United States isn't alone in developing offensive cyberwar capabilities. Russia, China, Israel and France are also developing advanced offensive cyber capabilities and, although there hasn't been an active cyber war, a cyber cold war might have already started.
Cybersecurity
Cyber risks place new demands on public/private partnership
Industry and government expect the new Cyber Command to set the agenda for needed improvements in public/private cybersecurity collaboration.
People
Telework proponents still face management resistance
Federal managers who oppose allowing their employees to telework have another opportunity to dig in their heels, retrench and batten down the hatches.
Digital Government
Google releases FISMA-compliant Apps for Government
Apps for Government is the first suite of cloud computing applications to receive Federal Information Security Management Act certification and accreditation from the U.S. government. Microsoft also working to obtain certification for Web-based e-mail.
Cybersecurity
Cyber talent hunt: the search starts at home
Before agencies can hire the cybersecurity professionals they need, they should make it easier for people to understand what they’re looking for.
People
An excerpt from the Telework Improvements Act of 2010
The following language is excerpted from H.R. 1722, sponsored by Rep. John Sarbanes (D-Md.) and passed by the House on July 14, 2010.
Cybersecurity