Exec Tech


Shutterstock image (by Peshkova): map with a finger to his lips asking for silence.

GSA enters quiet mode on telecom RFP

The rest of the month will be spent making final changes to the RFP, so GSA will not be responding to additional inquiries.

Mezzanine, innovate your workplace.

More screens, more millennials?

Getting young people into government can be challenging. One company's prescription: Wow them with a "Minority Report" conference room.

Shutterstock image (by Wichy): Businessman touching a glowing electric circuit to access a virtual network.

Prioritizing authentication, GitHub attacked, Carter back to Silicon Valley and more

News and notes from around the federal IT community.

Dave Gwyn

The new RFI: Request for innovation

The natural tendency of RFPs and RFIs to protect outdated architectures must be overcome if FITARA is to succeed.

Shutterstock image (by deepadesigns): Safety concept, closed padlock on a digital background.

Labor CIO pushes back against critical IG report

Dawn Leaf defended the department's efforts to implement two-factor authentication and raised concerns about the 'completeness and accuracy' of the IG's findings.

Are VA techies slacking off on Yammer?

A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

Agile Development Stock Image

Big money for agile, FCC's big move, NSF funding for ecodata and Interior's new look

News and notes from around the federal IT community.

iStockPhoto / FCW

Can America thump China for the OPM hack – and should it?

Foreign relations experts tackle tough questions of how, and if, the U.S. should retaliate against China for the latter's suspected orchestration of the biggest act of cyber espionage in history.

Robert O. Work, Deputy Secretary of Defense.

DOD sets up cyber workforce council

The group will include members from the offices of the DOD CIO, Defense undersecretaries for personnel and readiness, policy, and intelligence, and the National Security Agency.

Shutterstock image (by alphaspirit): hidden identity of an individual under a mask.

How OPM breach victims can fight back

Credit monitoring and credit freezes are recommended, as is providing false information for security questions on social media, banking and other websites.

data door

Another lawsuit for OPM, Ashley Madison's government customers and more

News and notes from around the federal IT community.

Shutterstock image (by GlebStock): hacker with graphic user interface.

OPM: CDM will offer baseline security

The continuous diagnostics and mitigation program will give agencies a much-needed standard for reporting vulnerabilities.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.