Technology

  • WFED\'s Jason Miller gives an update on the 26 high-risk IT projects on OMB\'s list.

    December 09, 2010
  • A paper by four senior Army officers and members of the faculty at West Point says the military’s use of social security numbers and other personal data put servicemembers at greater risk of identity theft…

    December 09, 2010
  • The biggest issue facing chief information officers in 2011 is hiring. A new Robert Half Technology survey found CIOs are concerned that they will have a hard time finding skilled information security professionals to fill…

    December 09, 2010
  • The Merit Systems Protection Board is well know for its workforce research studies, but how does it decide what to study? We learn more about it from MSPB\'s Laura Shugrue.

    December 09, 2010
  • The nation\'s No. 2 military officer on Wednesday strongly endorsed the warfighting value of information-sharing.

    December 09, 2010
  • Senior administration officials this morning will propose major changes to the way agencies buy, manage and implement technology over the next 18 months. The reforms include moving at least three technologies to the cloud, changing the role of CIOs and strengthening program management across the government. OMB applying industry best practices and lessons learned from TechStat sessions.

    December 09, 2010
  • The administration said its review of 16 of the 26 high-risk technology programs led to one termination, eight programs are scaled back and seven projects have accelerated delivery timetables. OMB said agencies saved or avoided spending $1.3 billion over the life of these 16 projects.

    December 09, 2010
  • The Agriculture Department would be the second major agency to announce it\'s taking critical functions to the commercial cloud.

    December 08, 2010
  • The IP initiative is just one in a group of changes the administration is making to Internet policy.

    December 08, 2010
  • Dec. 14th, 10:00 am Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.

    December 08, 2010
  • Patrice McDermott of OpentheGovernment.org, and David Stern of America Speaks, discuss lessons learned one year into the Open Government Initiative.

    December 08, 2010
  • Center for Internet Security\'s Steve Piliero discusses his group\'s study on cybersecurity metrics.

    December 08, 2010
  • The Office of Management and Budget will announce tomorrow major changes to how agencies manage their technology projects. You should expect new requirements around program management, a focus on cloud computing and several other ideas…

    December 08, 2010
  • The United States leads the world in fighter jets, warships and troops, but when it comes to cybersecurity top brass at the Defense Department say it’s a level playing field for the military and hackers…

    December 08, 2010

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.