GSA | GovernmentCIO Media & Research


The cloud capability does more than improve lag time — it also has the potential to transform federal IT.
Congress and GSA are working to improve FedRAMP amid the push for cloud adoption.
A GSA IT modernization lead highlights importance of governance, security, training and more during all stages of cloud migration.
Federal IT program and project managers argue that client engagement is critical to improving Agile processes.
RPA Community of Practice gathers experts to drive all-of-government progress with the technology.
Greater supply chain transparency and information-sharing will improve federal cyber posture.
Agile requires longstanding culture shifts and decisions rooted in data.
A new prioritization model for the Technology Modernization Fund ensures government has flexibility to modernize quickly.
Federal AI adoption emphasizes collaboration and efforts to develop objective data models.
Procurement innovation and access to digital services are some of the agency's immediate priorities.
The agency is driving adoption of emerging technologies through innovative IT contract vehicles.
The pandemic increased the need for secure, modernized and evolved solutions to expedite federal response efforts.
A NAPA report calls on OPM to leverage data analytics and modernize IT systems to support innovation in managing the federal civilian workforce.
GSA received $1 billion for the Technology Modernization Fund to upgrade federal cybersecurity and IT.
Partnerships are enabling well-rounded capabilities at GAO, GSA and State.
With all the options out there, the federal government ran into unique interoperability and security issues with communication software.
Officials from CISA, GSA and NIST say information sharing will be key to managing security risks in the supply chain.
Amid the SolarWinds breach last year and reliance on strong IT infrastructure in the pandemic response, agencies may receive a big bump in IT funding.
Modular contracting can allow federal agencies to move beyond a one-size-fits-all approach in software development and delivery.
The two security methods can enhance overall cybersecurity protocols.