Exec Tech


Shutterstock image: filing cabinets.

Can agencies build greater trust in the FOIA process?

Agency officials hope that technology can help automate practices to make the government more transparent -- but they first need to improve the practices themselves.

data abstract

How to report cybersecurity strategies to senior leaders

Government agencies can look to the private sector for the proven elements of a successful executive briefing.

ORNL Single-Photon Source Approach for Quantum Encryption (Photo by Qubitekk)

Oak Ridge licenses its quantum encryption method

A commercial firm hopes to use the technique to help the energy sector protect power-grid data from cyberattacks.

Shutterstock image: illuminated connections between devices.

Re-evaluating the need for 'I' in IoT

A "network of things" might be a better way to describe and categorize elements of connected-device environments.

Shutterstock image: shadowed hacker.

ICS-CERT analyzing grid-crippling malware

ICS-CERT is teasing out signatures of a new family of malware to help identify code that targets critical infrastructure.

digital key

A security solution that's simple for government, tough for attackers

Format-preserving encryption can secure legacy systems and new solutions alike.

Shutterstock Image: Navy signal lantern

Navy makes old signals new again

A new project will bring a 200-year-old seaborne communications technology into the current digital ocean.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

The enterprise risk management approach to cybersecurity

Better cybersecurity tools are not even half the battle.

Shutterstock image: cloud technology connections.

How cloud can take open data to new heights

By removing the storage and transmission barriers, agencies are seeing the use of their datasets explode.

Shutterstock image: digital records.

The future of FOIA

Technology alone has not made FOIA operations more efficient and transparent, so a committee led by the National Archives is working with agencies to improve the process.

Shutterstock image: mobile device security, continuous monitoring concept.

DHS makes mobile security a priority

Mobile security continues to be top priority for the Department of Homeland Security, which has multiple efforts underway to address threats to federal devices.

abstract image of money

To fight fraud, follow the data

Federal program managers are being urged to use data analytics and information sharing to sniff out fraud, abuse and improper payments.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group