Sequestration and DoD: Watching that old pendulum swing!

Watching that old pendulum swing! Nothing puts me to sleep faster than the tick-tock of a clock. Better yet: a grandfather clock! I love sitting there watching the pendulum swing back and forth, back and forth. It’s hypnotic! So maybe that’s why I keep falling asleep as this “sequestration crisis” implodes around me! To my […]

Love and Empathy for the DoD Technologist

IT professionals in the Department of Defense have always faced unique challenges. They serve missions of global importance, in the face of full spectrum threats (with many in war zones and all facing hostile cyber threats), and have always had to operate under a burdensome regulatory environment that can slow most actions. And they have always operated […]

Fed IT Watchers: You need to know sequestration isn't over yet

Surely you didn’t think sequestration was over did you? But just in case you crossed this off your worry list we are here to remind you, the impacts of current delays are going to be disruptive, and the threat more “can-kicking” still exists and can make things even worse. Full scale sequstration, as articulated in […]

New year, new Congress: What's next for DATA?

[This post by Hudson Hollister is cross-posted on the Data Transparency Coalition's blog.]   Tomorrow a new U.S. Congress – the 113th, elected last November – will be sworn in.  The 112th Congress finished its run with a divisive confrontation on fiscal priorities. Advocates of opening up government data are rightfully disappointed at the lack […]

The Federal Shared Services Strategy, Potential Staffing and Support Cuts, and More


Here is today’s federal cybersecurity and information technology news round-up: Federal Chief Information Officer Steven VanRoekel released  the Shared Services Strategy on Wednesday along with a guide for a Common Approach to Federal Enterprise Architecture. More here. The Department of Defense and Department of Homeland Security are pressuring Congress to pass cybersecurity legislation, warning of potentially serious cyberattacks […]

First, Do No Harm

Last week, I had the chance to listen to and speak with Representative Adam Smith of Washington state about cybersecurity legislation at a reception. This year has been pivotal for passing regulations to govern cyber, and attendees of this security event wanted to know his thoughts on the variety of proposed laws. While Rep. Smith […]