Government Computer News
If the ongoing reporting and scorecards for the Federal Information Technology Acquisition Reform Act have proved anything over the past several years, it’s that many agencies have had trouble quantifying sensitive data — where in their infrastructure it is located, who can access it and how susceptible it may be to cyber threats.