Exec Tech


Shutterstock image (by wk1003mike): cloud system fracture.

Of garden hoses, tennis bracelets and FedRAMP

"Not every application is meant for the cloud," says the director of the GSA program that certifies cloud security.

Map of Silicon Valley (PR Newswire/SiliconValleyMap.com)

McCain touts DOD/Silicon Valley ties, RAND ponders cyber reputations, and more

News and notes from around the federal IT community.

Shutterstock image (by Nomad_Soul): Silhouette of a businessman in the end of a documents tunnel.

IGs want computer-matching rules eased

Restrictions on accessing records across agencies are hamstringing government watchdogs -- but there's hope for a change.

Heidi Shyu, United States Assistant Secretary of the Army for Acquisition, Logistics, and Technology

Army fights a two-front cyber war

The Army has been testing weapon systems for sophisticated cyber threats, but it was an attack on its public website that underscored the breadth of the challenge facing defense agencies.

Senators Angus King (Maine) and Mark Warner (Virginia)

Senators: End sequester to pay for cybersecurity

OPM's fiscal 2016 request of $272 million includes $21 million for finishing network upgrades begun in fiscal 2014.

Dave McClure_Veris Group

Ground rules for improving federal cybersecurity

In today’s complex cybersecurity environment, these three elements form the foundation of agencies’ ability to defend networks and data.

Bookshelf: Critical Knowledge Transfer

Knowledge transfer through discovery

Rules and data are relatively easy to share, but capturing an organization's deep, experience-based knowledge requires special effort.

Shutterstock image: examining a line of code.

Execs think their networks are safe (they’re not)

New survey shows that CEOs, CIOs and CISOs might have the wrong idea about how secure their networks really are.

FCW magazine: Aaron Levie

Aaron Levie: 'You can have a mindset of moving quickly'

Box's CEO discusses innovation, the "black box" of government and getting Silicon Valley to engage with agencies.

OMB cyber group meeting with a dozen agencies on steps to improve security

New oversight program targets slow progress on two-factor authentication and other cybersecurity practices.

cyber attack button

Syrian hackers say they knocked army.mil offline

The Pentagon acknowledged the hack, but did not confirm the attacker.

LinkedIn image: Rick Walsh.

Pentagon working on federated app store

To save money and time, Defense Department officials are moving gradually toward a shared catalog of approved mobile applications.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.