Agencies


Heidi Shyu, United States Assistant Secretary of the Army for Acquisition, Logistics, and Technology

Army fights a two-front cyber war

The Army has been testing weapon systems for sophisticated cyber threats, but it was an attack on its public website that underscored the breadth of the challenge facing defense agencies.

Tony Scott  (Photo: VMware)

How flexible should FITARA be?

The federal CIO told House watchdogs that IT reform would be implemented with strict oversight, but there are already rumblings inside agencies about possible exceptions.

Shutterstock image (by ra2studio): young businessman looking at a cloud concept wall.

Counting cloud contracts, defense approps, net governance and info sharing

News and notes from around the federal IT community.

Bookshelf: Critical Knowledge Transfer

Knowledge transfer through discovery

Rules and data are relatively easy to share, but capturing an organization's deep, experience-based knowledge requires special effort.

OMB cyber group meeting with a dozen agencies on steps to improve security

New oversight program targets slow progress on two-factor authentication and other cybersecurity practices.

compass innovation

OFPP to issue acquisition lab guidance

Using HHS Buyers Club as a model, the procurement office wants to encourage other agencies to launch acquisition innovation labs.

cyber attack button

Syrian hackers say they knocked army.mil offline

The Pentagon acknowledged the hack, but did not confirm the attacker.

LinkedIn image: Rick Walsh.

Pentagon working on federated app store

To save money and time, Defense Department officials are moving gradually toward a shared catalog of approved mobile applications.

Shutterstock image (by Ismagilov): Businessman with arrows pointing left and right.

Should the National Labs be exempt from FITARA?

Senate bill carves out exemption for supercomputing and other lab IT; an earlier version of the measure would have exempted the entire Department of Energy.

Shutterstock image (Dencg) : digital government concept.

RIP, HTTP

Federal websites will be required to tack on the "s" for "secure" by the end of next year.

Shutterstock image: breached lock.

OPM records the 'Holy Grail' of counter-intelligence

'Very old systems' and a lot of valuable, unencrypted data left millions vulnerable, despite the application of interior and perimeter defenses.

NASA picks 9 tools to scope out icy moon – and maybe alien life

Europa, frozen moon of Jupiter, might hold vast oceans and even life. NASA has OK'd a fleet of instruments aimed at exposing her secrets.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.