Exec Tech


image of man holding mobile device with world map and satellite dish in background

FCC passes new text-to-911 rules

While just two percent of Americans have access to text-to-911 services -- and not all commissioners support the idea -- new FCC rules promise wider deployment.

Shutterstock image: secure data stream.

A CyberVor silver lining for feds?

While federal websites were likely in the mix of targets, experts said agencies complying with FISMA and other cybersecurity guidelines should be OK.

Shutterstock image: checking documents.

DHS suspends work with USIS after cyberattack

Background-check firm says the breach "has all the markings of a state-sponsored attack."

world map

Cybersecurity: What the U.S. can teach Europe

European countries should take a cue from the U.S. and move from being reactive to proactive when it comes to cybersecurity policies, writes Titania's Edwin Bentley.

Shutterstock image: minimalist image of data-driven cloud technology.

EPA’s cloud computing conundrum

An IG report critical of the agency’s handling of its cloud services shows a “business as usual” approach to managing assets, says a Deltek analyst.

stylized professionals

Phased retirement, contractor performance, buying cyber threats and more

News and notes from around the federal IT community.

Image from Shutterstock.com

What keeps DARPA up at night?

The Internet of Things presents a challenge for both personal and national security, says DARPA's Randy Garrett.

 Shutterstock image: global health.

Collecting comments, bulking up for health IT and waiting for a crisis

News and notes from around the federal IT community

Cybersecurity research

How agencies' security efforts can drive economic growth

Government IT can support more than just an agency mission -- physical and cybersecurity alike are critical to economic vitality.

Shutterstock image.

Getting DoD to buy commercial IT

Former ranking defense IT officials argue that an empowered CIO would help the military focus on off-the-shelf IT and avoid the "death spiral of software development."

Cyberattack, financial services

1.2 billion stolen logins, but very few answers

The "CyberVor" attack dwarfs last year's Target breach, but the implications for government sites and records are still unclear.

Shutterstock image: protected hardware.

Before CyberVor: A dozen key federal breaches

As 1.2 billion internet logins are compromised, FCW revisits the most notable agency cyber-breaches of the last four years.