What is a contract vehicle?

what-isChris Wiedemann_65 x 85Last month, I began our “What is…?” series by looking at the very basics of government contracting. However, that information can only get you so far – knowing the size of the market doesn’t tell you how to capture any of it.

To that end, today’s post is going to look at one of the building blocks of selling technology – or anything else – to the federal government: contract vehicles.

Read more of this post

6 tips for finding opportunities in the $80 billion federal IT market

tkanalyticswebinar_022117barbara-austinBy Tim Knob, data analyst, and Barbara Austin, database manager

The government market is a huge opportunity for the tech industry. But it’s also one of the hardest to navigate, from following all of its rules and regulations to even finding the best opportunities that align with your company’s tech specialty.

What many in the industry may not be aware of is the vast amount of publicly-available resources that can help unearth some of those opportunities. There’s everything from Exhibits 53 and 300 to government websites full of valuable information on priorities.

Read more of this post

When deception is a good thing

Silhouette of a hacker with binary codes on background

nick-mirabile-resized2By Nick Mirabile, director of cybersecurity

In 2013, a pro-Assad group known as the Syrian Electronic Army hacked into the Associated Press’ Twitter account and broadcast a fake report about explosions at the White House. It caused the Dow Jones industrial average to drop nearly 150 points, erasing $136 billion in market value.

This is cyber deception in action. Cyber attackers have long embraced deception with tactics such as social engineering help-desk employees to install Trojans or obtain users’ credentials. If deception can be used to attack, can it also be used in cyber defense?

Read more of this post

4 ways to show NASA some love

Tom O'Keefenasa_021417By Tom O’Keefe, consultant

The next few years could be interesting for NASA, especially if the Trump administration tries to take aim at its climate observation work. But that won’t necessarily stop the space agency from continuing to innovate, embrace new technologies and continue its move toward the cloud.

In fact, while there have been recent challenges within the agency, particularly concerning cybersecurity, expect NASA to continue its role as a standard-bearer for new technologies within the federal government.

So what does that mean for IT vendors? Well to understand how to appeal to NASA, it’s important to focus on how to better enable its science and engineering mission. Here are some areas to focus on:

Read more of this post

Can data save state and local governments?

Rachel Eckertblog-sledanalyticsBy Rachel Eckert, SLED consultant

While the tumultuous situation in Washington is throwing a wrinkle into state and local politics, governments will continue to face a lack of funding and siloed operations. These two problems aren’t necessarily independent of each other, though. Siloed operations can create financial nightmares in the form of duplicative efforts and inefficient uses of data.

This was among the topics of discussion during last week’s Outlook 2017 event, organized by Governing Magazine.

Duplicative efforts and inefficiencies spell disaster for constrained budgets, which are already struggling to adequately fund education and public safety as Medicaid takes over an ever larger share of their budgets.

Read more of this post

Trump has a cybersecurity plan and it needs your help

Lloyd McCoy Jr.blog-eocyberBy Lloyd McCoy Jr., DOD manager

We got a sneak peek this week into what the Trump administration is thinking about with its cybersecurity strategy and it appears there won’t be a major departure from previous administrations.

The Washington Post obtained a copy of a draft executive order on strengthening U.S. cybersecurity and capabilities that President Trump was scheduled to sign yesterday, but the event was postponed.

What I was able to glean from the draft is that it reaffirms cybersecurity as a preeminent national interest and its emergence as a new domain, comparable to air, land, sea and space. In order to protect this interest, the order endorses the “full spectrum” of capabilities to defend U.S. cyber interests, suggesting a policy that embraces both cyber-defensive and offensive toolsets.

In line with the previous two administrations, the order also emphasized protecting both public and private critical infrastructure. While none of this is a major departure, there are a couple of provisions in the draft order that impact the IT community.

Read more of this post

Change is coming to the intelligence community

mark-wisinger_65x85ic_013117Before President Trump entered office, there was widespread speculation on how he would change the intelligence community. Incoming administrations typically lean on intel agencies to get up to speed on security issues, yet this election cycle featured President Trump’s open criticism of the three letter agencies.

It’s safe to assume there will be a few changes in this space. Much of the tension and debate is beyond the scope of this blog, but I’ll break down two significant changes I’m predicting will shake things up for IT procurement.

Read more of this post

%d bloggers like this: