Exec Tech


Lt. Col. Timothy Kneeland, commander of JBSA

At Joint Base San Antonio, Air Force lags on JRSS

Lt. Col. Timothy Kneeland, commander of Joint Base San Antonio’s 502nd Communications Squadron, says the base’s Air Force component is running behind on a key DOD IT modernization project.

Coast Guardsman using laptop

Coast Guard IT security gaps cited

A DHS IG report said Coast Guard IT remains vulnerable to removable media and email threats.

Image of the Pentagon

DOD's IPv6 transition lags

The Pentagon was supposed to wrap up its IPv6 transition in 2012, but an IG report says the effort stalled because IT officials didn't make it a priority.

Heartbleed virus within text

Heartbleed lives, D.C. loses power and the Fed gets high marks

News and notes from around the federal IT community.

analytics concept art

Clearing up confusion about data on nonfederal systems

NIST is seeking comment on the final draft of its guide to handling security for nongovernmental data.

abstract head representing big data

Making big data work

A draft of the NIST Big Data Interoperability Framework looks to establish a common set of definitions for data science.

Shutterstock image: shadowed hacker.

The importance of cyber offense: Sanctions are a good start

Cybercrime is too serious to rely solely on network defenses, Peter Harrell argues.

Richard Burr official photo, 114th Congress

Burr stumps for cyber bill

The North Carolina senator made CISA the focus of the Republican Party's weekly radio address.

Rand Corporation report: High-Priority Information Technology Needs for Law Enforcement

The one thing law enforcement really needs from IT

A new study urges the Justice Department to up its game on sharing the best tools and tactics with state and local partners.

FAA delays procurement to respond to hack

Unspecified cyberattack prompts agency to rethink its Security Operations Center requirements

Shutterstock image: shadowed hacker.

Piecing together the insider threat puzzle

Software and automation are crucial to preventing leaks and sabotage, but they're not the only tools deployed by agencies that collect and guard secret information.

Shutterstock image: digital record infrastructure.

How to ease the e-discovery impact of FOIA requests

Agencies can simplify the process of responding to Freedom of Information Act requests with a little training on new technology tools.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.