Exec Tech

Shutterstock image: breached lock.

OPM records the 'Holy Grail' of counter-intelligence

'Very old systems' and a lot of valuable, unencrypted data left millions vulnerable, despite the application of interior and perimeter defenses.

NASA picks 9 tools to scope out icy moon – and maybe alien life

Europa, frozen moon of Jupiter, might hold vast oceans and even life. NASA has OK'd a fleet of instruments aimed at exposing her secrets.

Shutterstock image (by Arthimedes): 3d polygonal illustration of earth, western hemisphere.

Report: State Department needs to rethink use of tech

A National Research Council study suggests utilizing NGOs to help Foggy Bottom identify growing trends in science and technology.

Shutterstock image: cyber defense.

Security experts: OPM breach shows Einstein isn't enough

Post-mortems on the OPM hack show that former officials agree on one thing: that Einstein 3 and CDM, cornerstones of federal civilian cyber defense, need to be enhanced.

Shutterstock image: the Capitol Building.

CJS funding bill would limit high-tech surveillance

Several provisions in the Commerce-Justice-Science bill would bar the use of funds for various surveillance activities.


Mobile app criteria, new Snowden revelations and more

News and notes from around the federal IT community.

Shutterstock image: connecting individuals to one another through an access point.

DISA redoing content delivery

The Defense Information Systems Agency is exploring the next version of its Global Content Delivery Service.

4 million feds exposed in massive OPM breach

U.S. officials reportedly suspect China’s involvement in the hack.

The ATLAS detector at the Large Hadron Collider, an experiment with large involvement from physicists at Brookhaven National Laboratory.

Hadron collider data tap open again

The facility shut down in 2012 for modifications that increased the volume and quality of data generated.

Shutterstock image (by igor.stevanovic): anonymous computer hacker.

Who knows what IT lurks in the hearts of feds?

Agency IT departments have no idea how many employees are using "shadow" cloud at work.

 Wikimedia image: A U.S. Air Force pilot navigates an F-35A Lightning II aircraft assigned to the 58th Fighter Squadron, 33rd Fighter Wing into position to refuel with a KC-135 Stratotanker assigned to the 336th Air Refueling Squadron over the northwest coast of Florida May 16, 2013.

Untold lines of code make Pentagon weapons vulnerable

DOD officials are up against a daunting challenge in making weapons systems more secure from hackers.

a man grouping items by shape

Health IT, one-stop convenience pitched as NITAAC advantages

Sorting out the alphabet soup of federal acquisition options means focusing on what your agency values most.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.