Exec Tech


Shutterstock image: protected hardware.

Cyber gets a boost in VA budget request

The department is seeking an increase in information security spending from $156 million in 2015 to $180.3 million for 2016.

Shutterstock image: black data center with white floors and ceiling.

DOD may need congressional help on data centers

Acting Defense Department CIO Halvorsen told a House Armed Services subcommittee that consolidating DOD data centers could require legislation.

Shutterstock image (by JMiks): Web URL.

Why Social Security's websites succeed

"They do a great job of setting expectations," said Dave Lewan of ForeSee, which rated five of SSA's sites in the latest list of top 10 federal websites.

Shutterstock image: binary tunnel of data.

DHS: 'We need to up our game' on information sharing

President Obama's proposal to boost government coordination with the private sector got a warm welcome in the House Homeland Security Committee.

Shutterstock image: global network of information sharing.

'What's the problem we're trying to fix?'

NTIA still faces headwinds in Congress about Internet domain control.

Image from Shutterstock.

EPA's new-old CIO, plus weapons acquisition, spyware warnings and a new role for Long

News and notes from around the federal IT community.

Shutterstock image: cyber eye.

How (and why) the CIA plans to expand cyber capabilities

The spy agency wants to better integrate cybersecurity into its traditional human intelligence operations.

Shutterstock image (by Amy Johansson): "Sorry we

DHS shutdown: 'There's an opportunity cost'

While a lapse in funding would have little “immediate operational impact” on cybersecurity, the longer-term ripple effects could be serious.

Stephen Warren

VISTA-based solution eliminated from DoD health record procurement

VA CIO Steph Warren was "disappointed" that a VISTA solution would not prevail at the Pentagon.

Richard Spires

Why being on GAO's High Risk List is good for federal IT

By putting the government's management of IT acquisitions and operations on the High Risk List, GAO has ensured it will finally get the attention it deserves.

Wikimedia image: Lieutenant General Edward C. Cardon.

Cyber threat challenges military structure

The military's traditional, top-down way of operating is being challenged by the non-diffuse nature of computer networks, says Lt. Gen. Edward Cardon, head of Army Cyber Command.

Shutterstock image: digital fingerprint, cyber crime.

DHS licenses malware forensics

The detection tech is the second to emerge from Science and Technology Directorate's Transition to Practice program.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.