Exec Tech


Shutterstock image (by Aleksandar Mijatovic): Iranian flag.

Debating the Iranian cyber threat

A new industry report attributes a surge in cyberattacks on Western infrastructure to Iran, but at least one security expert is disputing the findings.

Christopher Steel, Chief Solutions Architect for Software AG Government Solutions.

Test your IT portfolio IQ

By answering the questions in five core areas, IT leaders can see whether they are on the right path with their IT portfolio management practices

Shutterstock image: data analytics concept, blue.

GSA's proposed pricing data rule questioned

Industry representatives voice concerns about compliance costs and protection of pricing information.

Ron Ross of the National Institute of Standards and Technology (NIST).

NIST official: Internet of Things is indefensible

The interconnectivity of the Internet of Things makes cyber threats inevitable, says NIST fellow Ron Ross.

airliner

GAO: Planes vulnerable to cyberattacks

A new report says that FAA has been taking steps to protect air traffic control systems from hacks, but "significant security-control weaknesses remain."

Eric Rosenbach, Assistant Secretary of Defense for Homeland Defense and Global Security.

Pentagon to release cyber strategy next week

Newly minted Defense Secretary Ashton Carter's prioritization of cybersecurity will cross a threshold when the Pentagon releases a multi-year cyber strategy.

NIH's big IT contract, FEMA's weather alert app, hacker-on-hacker attacks and more

News and notes from around the federal IT community.

Shutterstock image: right tool, wrong application.

IT overlaps high on GAO's duplication list

Better management of software licenses, data centers and IT portfolios could save billions, says the annual GAO report on government efficiency.

Lockheed Martin

'Data is the new oil' -- a window into cyber forensics

A visit to Lockheed Martin's cyber forensics facility shows just how much cyber intelligence is in private hands.

CHESS Project Director Thomas Neff.

Can the Army build on ITES-2S momentum?

The key to the ongoing success of the Army's IT contracting vehicle is incorporating cloud and cybersecurity solutions into the next iteration.

Shutterstock image (by Arthimedes): 3d polygonal illustration of earth, western hemisphere.

Critical infrastructure cyberattacks increase across the Americas

A report from the Organization of American States shows cybersecurity is a hemispheric concern.

U.S. Capitol Dome

Information-sharing bill on tap in House Homeland panel

House Homeland Security Committee Chairman Michael McCaul’s bill offers liability protections for firms to share cyber-threat information with the government.