Commentary
FAR overhaul: The challenges in tackling federal procurement’s 5,000-page beast
The General Services Administration's acting leader outlines a blueprint for how the Trump administration wants to streamline regulations, a move aimed at opening the market to more competition and "best-in-class" companies.
The beating heart of small business: An ominous threat grows louder
Small businesses are suffering under contract cuts driven by the Trump administration and the Department of Government Efficiency, writes Lisa Shea Mundt of the Pulse of GovCon.
The coming cyber reckoning for federal contractors
Contractors face a 90-day deadline to prove their cybersecurity compliance as awards for the OASIS+ vehicle start to fall and that is a precursor to broader industry-wide requirements, DTS CEO Edward Tuorinsky writes.
Deal for Splunk brings new capabilities and competitors to Cisco
COMMENTARY | There is little to no overlap between the two but Cisco picks up more software based solutions that should strengthen its core.
How federal agencies can integrate artificial intelligence into records management
COMMENTARY | Agencies need to factor newer forms of digital records—like those Zoom meeting recordings—into their records management plans.
All software is guilty until proven innocent
COMMENTARY | Agencies must embrace "shifting left," an approach that takes securing software in mind at the beginning of the development lifecycle.
Pass the CHIPS Act
COMMENTARY | Two former senior defense and intelligence leaders lay out the case for Congressional action to help the U.S. semiconductor industry.
OMB's mixed messages on mobility are putting federal agencies at risk
COMMENTARY | Why the Office of Management and Budget needs to revise the 2022 FISMA Metrics and explicitly reinstate the mobility metrics and threat defense protections.
Dear agency senior executive: You can make or break your next big tech initiative
You may have heard that modern principles can help you reduce risk on projects like yours, but changing the way you work isn't easy.
Achieving incident response maturity is critical for effective threat management
Agencies should take the principles outlined in CISA's playbooks and make them their own.
It's time for another look at election security – through a technological lens
Using a mobile device to cast a ballot – secretly, securely and verifiably – and having the ability to validate the accuracy of the voting process is certainly possible, and it's time to start taking that possibility more seriously.
Featured eBooks