Shutterstock image (by adhike): hacker over a screen with binary code.

Supreme Court OKs expanded hacking power for FBI

Congress has until Dec. 1 to alter an administrative procedure change that would allow U.S. judges to issue warrants for the FBI to hack into computers outside U.S. jurisdiction.

Sen. Johnny Isakson (R-Ga.)

Senate VA bill looks to change agency culture, accelerate termination for cause

A new bill would make it easier for the VA secretary to fire executives and rank-and-file employees.

Shutterstock image (Dencg) : digital government concept.

USDS-built web app seeks to help with student loans

As part of a new initiative to modernize student loan repayment, the U.S. Digital Service designed a web app that breaks down options for borrowers.

Shutterstock image (by wavebreakmedia): digital lock superimposed upon a data center.

GAO: SEC needs to follow its own security plan

A new GAO report says the SEC's financial data could be accessed by former or disgruntled employees unless proper access management controls are instituted.

Thunderbird Supercomputer at the Sandia National Labs.

HPC boosters back FITARA exemption for national labs

At a Capitol Hill conference, high-performance computer operators and vendors said the powerful machines should not be categorized as garden-variety IT for the purposes of procurement.

Shutterstock image. Copyright: T.Dallas

Vendors cry foul on Halvorsen's Windows 10 recommendation

DOD CIO Terry Halvorsen has said he does not formally endorse the operating system, but software vendors believe his praise amounts to an endorsement.

Shutterstock image (by edel): graduation cap and diploma.

Why OPM is prioritizing higher education for feds

A new training push might be equipping feds with skills that could help them jump to the private sector, but one leader says that's okay.

stylized professionals

DHS set for new wave of IT hiring

DHS is developing an IT/cybersecurity-specific hiring fair, and the agency might take the show on the road.

Shutterstock image (by adhike): hacker over a screen with binary code.

Can investigators reverse engineer insider threats?

The idea is to use past insider threat incidents to stitch together profiles of future rogue employees.

Shutterstock image: digital records overlay.

More modern IT could keep SSA from mailing out Social Security numbers

The Social Security Administration's internal watchdog said modernization would help the agency keep personally identifiable information out of mailings to beneficiaries.

cost ratio graphic

DOD slammed on ENCORE III contracting

Two federal contracting groups don't like the Defense Department's selection process for its massive upcoming $17.5 billion multiple award IT contract.

Protecting physical infrastructure with cyber

DHS' Suzanne Spaulding stresses that, in order to protect the physical infrastructure on which our nation depends, government and private sector alike must bolster cybersecurity.

FCW in Print

In the latest issue: grid security, agile development, BYOD and more!

More from 1105 Public Sector Media Group