by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : July 15, 2015
Trending of federal IT managers describe their agencies’ network infrastructure as scalable 14% 10 July 15, 2015 FCW.COM RegisteR Now At: FCW.COM/2015CloudSession1 FEATURING: Navin Vembar, Director, gsA it integrated Award environment Division (PMP), general services Administration FCW WEbCAST SERIES sessioN 1: Cloud Computing: Platform for Innovation JULY 21st, 2015 @ 2PM eDt REGISTER EGISTER CLoUD CoMes of Age SPONSOREd by: VMware, Carahsoft and Carpathia, A QTS Company We did not devote much coverage in this issue to the breaches of vari- ous personal data that the Office of Personnel Management revealed in June. That story was sure to evolve significantly by the time this magazine reached readers, so we devoted the pages to other topics — and trust that everyone is well caught up via the ongo- ing breach coverage on FCW.com. There are, however, some impor- tant questions still worth asking, and I’m fairly certain they won’t have been fully answered by the time you read this. • What monitoring systems were in place, and which one spotted the intrusion? • Was this one coordinated exfiltration or a series of distinct breaches? Is one scenario more troubling than the other? • Does this suggest some hypocrisy in OPM’s firing of USIS last year after that vendor ’s systems were breached? Or did that intrusion somehow facilitate this one? • How many other agency systems are now at greater risk because of the stolen data? • What steps, beyond basic credit monitoring, are needed to protect the affected employees? How many are now unable to safely continue in sensitive roles? • Are federal systems now better secured? How much progress was really made in the 30-day “cyberse- curity sprint”? I wish there were easy answers. But I suspect we’ll be adding more questions for a long time to come. — Troy K. Schneider firstname.lastname@example.org @troyschneider EDITOR’S NOTE A breach too far? 0715fcw_003-010.indd 10 6/23/15 3:59 PM
June 30, 2015
July 30, 2015