Jon Johnson, former GSA official, describes the fallacies he sees driving the General Services Administration's desire consolidate the buying of so-called common IT goods and services.
A common mistake even the smartest subject matter expert makes is not taking the time to listen to the customer and understand their concerns, writes BD practitioner Nic Coppings.
The cybersecurity program’s first major overhaul in more than a decade promises faster and automated approvals with the door being potentially more open for new entrants, writes Amanda Mull of immixGroup.
Organizations that master the art and science of transforming raw government data into actionable market intelligence will separate themselves from the pack, writes Ryan Felts of Deep Water Point.
Mark Amtower, marketing expert and a LinkedIn evangelist, explains why the social media platform a critical tool for navigating the influx of new leaders under the Trump administration.
Challenges occur in a mere 2.2% of all federal contracts, a number that could go even lower with more training of acquisition professionals and higher-quality debriefings.
Jim Carroll, the Professional Services Council's new CEO, gives his perspective on how cost-saving governance is achieved when the public and private sectors work in tandem.
With mandatory third-party audits now in effect, government contractors must act quickly to meet stricter cybersecurity standards or risk losing DoD contracts, writes Aprio’s Raj Raghavan.
Gina Scinta, deputy CTO for Thales Trusted Cyber Technologies, offers a seven-step roadmap as organizations face a narrow window to move off of vulnerable encryption algorithms.
From defense contractors to systems integrators, companies that communicate clearly will emerge as tomorrow's leaders, writes marketing guru Kristina Messner.
A proposed change to the Small Business Innovation Research program would deprive the military of some of its best problem-solvers, writes Robert Smith, former director of the Navy's SBIR/STTR programs.
Despite budget constraints, cyber defense remains a top priority as AI, automation and emerging threats reshape opportunities for federal contractors, writes Scott Orton, CEO of Owl Cyber Defense.
The non-regulatory nature of the yet to be published guides makes them likely to be non-protestable with limited exceptions, writes attorney Stephen Bacon.
The General Services Administration's push to become the government's single buyer for most IT products and services starts with a focus on some of the most common tools we use in our daily lives.
Both websites for the National Institutes of Health's CIO-SP and CIO-CS contract vehicles are dark, leading to questions over whether the long-time contract vehicles are being shuttered.
Dr. Thomas Graham, vice president and chief information security officer at Redspin, lays out key principles for contractors to follow in the preparation and execution of their compliance with the Cybersecurity Maturity Model Certification.