The Government Accountability Office recently released a report that assessed the progress seven agencies have made in implementing the Cloud First policy and came up with their seven top challenges.
Known vulnerabilities provide the most frequently attacked targets in commonly used software. NIST offers updated guidance for handling this crucial and challenging chore.
Although HelpSTAR2012 is not cheap, cutting downtime and streamlining help desk calls can be worth the money over time.
Intel's approach to managing personal devices, which includes evaluations under five general criteria, could be of interest to agencies of similar size.
A survey of government officials indicates that it is cost savings — not politics — that drives technology purchasing.
The Inspector General says the consolidated Security Operations Center has improved its security but still has some key vulnerabilities.
Behind the plan are all the pieces for a robust, 21st-century platform.
Central Michigan University is starting while it still has plenty of IPv4 address space left, giving network administrators time to listen, learn and implement.
IPv6 is not IPv4, and administrators will have to learn new tricks in setting up and running networks using the latest protocols, one network manager says.
The strategy envisions a governmentwide architecture that can leverage innovative technology to make more government data and services available through a variety of channels.
Many government departments and agencies have rid themselves of the most obvious efficiency offenders: small data centers, facilities previously marked for closure and IT resources deemed surplus to mission requirements.
Is it just coincidence that unmanaged and unpatched software continues to be a major security problem?