Who Are We Online, and How Do Others Know That? The National Strategy for Trusted Identities in Cyberspace

A majority of the country, and virtually the entire Federal Government, now uses the Internet to do business, learn about programs, shop, talk to friends, and engage in a host of other activities.  Some 2 billion people around the world engage in online commerce that will soon exceed $10 trillion; individuals place their information and trust in the many large and small businesses that provide services over the web.  In order to operate online, both the sender and the recipient have to trust what each other is doing. 

Predictive Security Intelligence: Achieving Holistic Cybersecurity

No longer can security programs rely on “if it’s not broke, don’t fix it” — adversaries could already be inside systems, stealing data or probing to get in.  Too many CIOs and CISOs have thought their systems and data were secure when in fact the opposite was true.   Security programs need effective protection of valuable information and systems to prevent data breaches, and to comply with the ever increasing federal compliance requirements (such as the Federal Information Security Management Act (FISMA), the Privacy Act, policy and guidance from the Office of Management and Budget (OMB) an

The Secrets to Getting Off the GAO High Risk List

Introducing the Center’s New Shared Services Fellow: Jesse Samberg

The Federal government’s recent establishment of the Unified Shared Services Management (USSM) office at the General Services Administration has propelled cross-agency efforts led by the Office of Management and Budget, by providing additional support to shared services efforts managed by the Department of the Treasury for financial management, and the Office of Personnel Management for human resources. State and local governments are also moving forward to take advantage of the benefits that shared services bring in terms of costs savings and improved performance.

Citizen Engagement in the Government – Where to Start?

A New Corridor Open in the State Department

When Twitter launched in 2006, it would have been impossible--perhaps even irresponsible--to predict its success or the ways in which people would use the platform, shape its language, and through it, change the social media landscape.  Over time, the people who used Twitter helped identify the most valuable features (hashtags, anyone?) and its most relevant fora (conferences and

Post-Award Contract Management – Where the Acquisition Rubber Meets the Performance Road

Weekly Roundup May 20, 2016

Report card day: Agencies remain average or below on IT reforms. House lawmakers are set to release the second scorecard grading agencies’ implementation of the Federal IT Acquisition Reform Act (FITARA) and the progress across all four categories is limited.

Pages