Image of the Pentagon

Pentagon releases cyber implementation plan

The plan prioritizes identity authentication, reducing DOD networks’ attack surface, device hardening, and aligning computer network defenders with DOD IT systems and networks.

Shutterstock image.

Verisign gets extension on .gov duties

GSA extended Verisign as the .gov top-level domain registrar for a year while it mulls how to bid out the work.

Image copyright to the Navy: Sailors man the bridge helm station to the Arleigh Burke-class guided-missile destroyer USS Mustin (DDG 89) during a replenishment-at-sea.

Navy workforce memo separates cyber from IT

A recent policy memo from Navy Secretary Ray Mabus differentiates the IT and cybersecurity workforces.

Army NIE networked soldier

Single service provider for upcoming draft mobility RFP at DISA

DISA looks to single service provider for mobile device management.

Shutterstock image: examining a line of code.

CDM-as-a-service great, but what next?

Small agencies feel the cyber talent squeeze more than big agencies, but they’re looking eagerly to CDM-as-a-service to help secure their networks.

Shutterstock image: Cloud concept.

The 'Fix FedRAMP' crowd agitates for change

An industry advocacy group released a six-point plan asking for improvements to help promote speed and transparency in the government process for vetting cloud service providers.

LaVerne Horton Council

VA leaders cite progress on health record interoperability

Top Veterans Affairs officials testified this week that electronic health record sharing with the military is operational, while putting the brakes on modernizing their own health records system.

Cybersecurity - CompTIA 2012 Information Security Trends Report

DOJ official, former counterterror czar spar over Apple

The court order is a dangerous effort to compel speech in the form of writing software code, said Richard Clarke, a former White House counterterrorism adviser.

Shutterstock image: looking for code.

The Pentagon wants to be hacked -- and learn from it

DOD has its own "red teams" that probe sensitive defense networks for vulnerabilities, but the Hack the Pentagon initiative goes a significant step further by inviting private-sector hackers to get out their digital scalpels.

Shutterstock image (by Bruce Rolff): eyes in a binary tunnel.

DHS to launch new system for insider threat data

The Department of Homeland Security is releasing a new data system for tracking suspected insider threats -- both inside the agency and among those with access to DHS facilities and IT.

Shutterstock image.

When agile development is change management in disguise

The current and former heads of 18F agree that when it comes to digital services, the tech is often secondary at best.

Image from

Lawmakers seek controls for access to geolocation data

The Department of Justice is resisting calls from some members of Congress to use warrants to access historical geolocation data.

FCW in Print

Check out the digital edition of FCW magazine -- the federal IT community's premier publication.

In this issue: Profiles of every Fed 100 winner, the government and industry Eagle Award winners and more.

More from 1105 Public Sector Media Group