Acquisition

GSA adds data security solutions to Schedule 70

The agency says Adobe’s electronic signature solutions and other tools will help agencies manage a broad list of federal security requirements.

Cybersecurity

53 steps to stronger cybersecurity

The Commission on Enhancing National Cybersecurity issued its long-awaited report, which calls for (among many other things) a new agency to consolidate, administer and secure federal IT infrastructure.

Cybersecurity

Feds help bag international malware platform

Working with other nations, the FBI helped take down a international criminal infrastructure platform that has been spewing malware and ransomware since 2009.

People

Pushing for results-based procurement reform

A former OFPP administrator outlines steps the next administration can take to improve the federal acquisition.

Acquisition

DOD opts not to rush new R&D rules

The Pentagon is looking to give contractors a bit more time before it steps in for closer review of their independent, government-funded projects, a top Pentagon tech official said.

Modernization

EIS: The other transition

With a planned spring award of its multibillion-dollar, next-generation telecom contract, GSA wants to focus attention on another transition going on in government.

Modernization

IT, cyber challenges loom for next administration

Big data, modernization and other issues will link the incoming and outgoing administrations.

Cybersecurity

DHS opens up infrastructure protection program

DHS wants innovators to help address cybersecurity in the financial sector.

Digital Government

FAA should examine near-space vehicles, GAO says

GAO has told the FAA to take a look at how it might regulate near-space vehicles as commercialization of the last frontier continues.

Acquisition

Is GSA doing enough about contractor tax-delinquents?

A House committee wants the General Services Administration to ensure that its primary contractor database contains accurate information on companies that are delinquent on their taxes.

Cybersecurity

DOJ gets new legal tool to go after botnets

A procedural shift makes it easier for federal law enforcement to investigate attacks that use devices scattered across the country.

Cybersecurity

Cyber panel closes in on final recommendations

A panel of business, technology and academia leaders is finalizing ideas for how to approach cybersecurity in the next decade.

Digital Government

NTIA software tool shows spectrum use

A new report reveals how federal agencies manage broadband wireless spectrum via a graphics-based software tool, which can help in the effort to free spectrum for commercial use.

Cybersecurity

Study backs IoT/DDoS concerns

A new study from one of the companies that battled a huge internet device-based attack underscores the need for stronger internet-of-things security.

Digital Government

Justice Department issues 'smart gun' specs

After six months of talks with firearms firms, law enforcement and independent experts, DOJ officials unveil baseline requirements that could be applied to agency purchases.

Modernization

Cloud adoption slowed by culture, even with FedRAMP

Cloud adoption, some agency execs say, continues to be a slow and frustrating slog.

Modernization

End of administration rush, then quiet in federal IT contracting

A leading trade group forecasts a spike in federal IT contracting activity followed by a lull as the Obama administration transitions to the Trump presidency.

Digital Government

Connolly: Choppy waters ahead for civilian agency IT

FedRAMP, 18F and the federal workforce as a whole face uncertain futures in the next administration, according to Rep. Gerry Connolly.

Acquisition

GSA offers feds a hand with contract writing

Federal agencies will be able to sign up with the General Services Administration's contract writing as-a-service in the coming year.

Cybersecurity

NIST's new take on IoT security

NIST's new guidance on security for the internet of things is not prescriptive like FIPS but instead offers a foundation for engineering security into connected devices.