Agencies


Shutterstock image (by kstudija): telecommunications radio tower.

Agencies face static in spectrum relocation

Although the Spectrum Relocation Fund addresses the perennial issue of migrating agencies off of scarce spectrum, more innovation and perseverance is required.

Image of the Pentagon

Why DIUx shouldn't exist

While DIUx is addressing defense innovation and acquisition shortfalls, experts say the need for a procurement acceleration program shows just how broken the acquisition process is.

Claire Grady

Career procurement exec tapped for top management post at DHS

Claire Grady, who has held senior procurement positions at the Defense Department and the Department of Homeland Security, is President Trump's nominee for deputy undersecretary for management at DHS.

Image from Shutterstock.

Senate bill codifies vulnerabilities board

In the wake of the WannaCry ransomware epidemic, two senators are teaming up on a bill to create a legal framework for the disclosure of IT vulnerabilities discovered by U.S. intelligence agencies.

NIST's school for cyber

The federal government's standards setter is offering agencies advice on how to implement the cybersecurity framework.

Warner wants updates on feds' software patching

In the wake of the global WannaCry ransomware attacks, one senator wants assurances that the federal government is patching its systems.

Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

Where the MGT money will go

Tech leaders are already planning how to spend the money in the Modernizing Government Technology Act.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

ShadowBrokers threaten to release more NSA tools

The cryptic ShadowBrokers are threatening to release more stolen NSA hacking tools through a new subscription service unless someone buys all the data from them.

Will Hurd

MGT Act headed for House vote with slimmed-down CBO score

The revised IT modernization bill will cost $500 million to implement, according to the Congressional Budget Office.

Shutterstock image.

Why disclosure rules didn't prevent the WannaCry attack

The WannaCry ransomware attack that crippled computers across the globe exploited a vulnerability that Microsoft had patched well in advance, but countless users failed to update their systems in time.

Cyberattack, financial services

NSA exploit behind global ransomware attack

An exploit based on hacking tools stolen from the National Security Agency is behind a global ransomware attack affecting tens of thousands of computers.

Shutterstock image: mobile device security, continuous monitoring concept.

Social Security takes a second crack at two-factor authentication

Almost a year after rolling back a mobile phone-based authentication plan for its public beneficiary services, the Social Security Administration unveils a new approach.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group