GSA proposes cyber addition to Schedule 70

GSA wants to create a new category under Schedule 70 to make it easier to call out cyber and information assurance products and services.

Why Salient CRGT makes sense

Mergers of equals are rare in this market, but Salient CEO Brad Antle gives an inside view of how his company and CRGT made it happen.

CSC gets closer to split

Computer Sciences Corp. is moving steadily towards its split, and the public sector business is reporting strong results that bode well for an independent future.

CGP, GSA working to avoid chaos once schedules expire

With many GSA schedules contracts set to expire over the next few years, the time is now for GSA to figure out a game plan for those contractors who hold these schedules and the agencies that rely on them.

14 White House executive orders targeting contractors

The Professional Services Council has released a list of the executive orders issued under the Obama Administration that have affected the federal contracting community.

U.S. Cyber Command planning $460M IDIQ RFP in September

The U.S. Cyber Command plans to set up a five-year, $460 million multiple-award contract to provide it and the Cyber Mission Force with cyber operations and planning support.

Opinion

A little behavioral psychology goes a long way in BD

The people part of the business development equation is just as critical as the process piece, but it is too often overlooked.

FBI wants mobile biometric app for Android

The FBI has issued a draft request for quotes as it moves toward a contract to develop an app to capture biometric data on Android devices.

Social Security Administration needs IT support for baby boomers

The Social Security Administration wants advice on how best to prepare its management and program information systems for the influx of more than 70 million baby boomers who soon will become beneficiaries.

OMB planning cyber guidance for contractors

The Office of Management and Budget is planning guidelines meant to boost contractor cybersecurity in the wake of the data breaches, FCW is reporting.

Opinion

Bring the power of project management to your BD process

By applying project management techniques and principles to your business development process, you can improve quality, efficiency and control costs. Here's how.

Opinion

5 ways to grab your share of the fourth-quarter rush

The government spends a third of its total annual budget in the fourth quarter, and here are five steps that can help your company grab its share of the opportunities.

e-QIP reopens for business

With the reopening of e-QIP, the security clearance process begins again and contractors are breathing a sigh of relief.

NGA warning: Share past performance data or else

A small business official with the National Geospatial-Intelligence Agency didn't pull any punches when she warned them about not sharing past performance data of small business subs: If you don't share, she'll take you to court.

WT Industry Day: Inside the Defense Department's IT opportunities

In the second of our series of Washington Technology Industry Days, we take a deep dive into the IT priorities, opportunities and procurement culture of the Defense Department.

Capitol Hill's cyber focus is good and bad

DLT Solutions' cyber expert Don Maclean offers his analysis of the good and bad in the leading cybersecurity proposals being considered by Congress.

PAE sees early payoff for A-T deal with new contract award

A new contract award for PAE solidifies the company's business case for acquiring A-T Solutions earlier this summer.

Lockheed's lessons in differentiation

Lockheed Martin's decision to sell the bulk of its IT business is another example of the challenge of differentiation in a market focused on price.

Lockheed to sell bulk of IT business

In a bold portfolio shaping move, Lockheed Martin announced plans to sell off $6 billion of its IT business while investing $9 billion to get deeper into the helicopter business.

Opinion

4 tips for fighting the growing wave of dotgov hacks

The attacks on government networks will only continue to grow, but there are steps you can take today to help protect your systems in the face of increasing threats.