Exec Tech

Shutterstock image: cyber eye.

ITAPS recommends vast changes to federal cybersecurity policy

Among the suggestions from the Information Technology Industry Council's public sector division was establishing a permanent administration role that directs cyber activities across the government.

Shutterstock image (by Graphicworld): hand holding a mobile phone indicating a health application.

In health apps, the game's the thing

Device-agnostic, gamified health apps will drive a new era of self-managed health care. If it isn't fun and well designed, it might not be worth pushing out at all.

Shutterstock image (Orhan Cam): U.S. Capitol at night.

As Senate moves on cyber, DHS cautions on privacy

Senate legislation could put DHS in the position of contributing to the "compromise of personally identifiable information,” says Deputy Secretary Alejandro Mayorkas.

Shutterstock image: hacker.

Is hacking back a cyber-theft deterrent option?

A new study on economic espionage in cyberspace reflects the shifting conversation in Washington on passive vs. proactive defense.

Shutterstock image: discussing a contract.

FITARA good and bad, US-CERT warns of spear phishing and more

News and notes from around the federal IT community.

multifunction printer

3-D printing could offer flexibility for system upgrades

The emerging technology could give the Pentagon more flexibility in upgrading deployed systems in an ever-evolving threat environment.

HHS security goes back to basics

Don't plug smartphones into medical machines. Log off your computer. Keep your password to yourself. The medical community has plenty of room to improve when it comes to keeping critical data safe.

Shutterstock image (by deepadesigns): Safety concept, closed padlock on a digital background.

After the cyber sprint: 14 agencies meet Tony Scott's mark

The federal CIO published a scorecard showing how agencies had boosted -- or, in some cases, failed to boost -- their strong authentication implementation during the government cyber security sprint.

Shutterstock image (by robuart): application development, program code.

An explainer on containers

If containers continue to advance into federal enterprise IT, they could spell the end of monolithic legacy applications.

Shutterstock image (by Tale): working on a digital tablet.

A vote of confidence for USPTO telework

After questions were raised about a pioneering agency's productivity, an outside review suggests improvements -- but declares the telework program essentially sound.

computer network

In first policy speech, DIA director prioritizes ICITE

Lt. Gen. Vincent Stewart pledges to drive an ambitious intelligence community IT project forward.

iStockPhoto / FCW

China hacking map, getting behind Einstein and Alabama cyber

News and notes from around the federal IT community.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.