Exec Tech


Shutterstock image: cloud interface.

GSA wants feedback on cloud contract language

A recent RFI seeks examples of effective and problematic contract language as well as suggestions on how to incorporate cloud services into different contract vehicles for direct solicitations, resellers and system integrators.

Bing Wen/Shutterstock.com

Why it's harder than you think to hack a voting machine

Despite the fear and hype, there are several obstacles that make the most direct form of tampering, altering vote counts, extremely difficult.

Rob Joyce NSA/WH

Joyce: Civilian cyber could use more discipline

The top White House cybersecurity adviser suggests civilian agencies could take a page from the Pentagon's handbook.

Shutterstock image: data analytics concept, blue.

DATA Act oversight highlights growing pains

The first round of oversight reports on financial reporting under the Data Act shows that most agencies are experiencing growing pains when it comes to implementing the recent law. Does that mean it's working?

agile development (Kmannn/Shutterstock.com)

Agencies failing key agile test

An oversight report found that most agencies were failing to certify implementation of incremental development on some major software projects.

Shutterstock image. Copyright: Lightspring

A user's guide to IT modernization

There are new big plans for federal IT modernization, but the old pitfalls remain.

Kirstjen Nielsen 2015 world economic forum davos creative commons credit Valeriano DiDomenico

DHS nominee faces Senate

Kirstjen Nielsen told a Senate committee that a planned border wall won't span the entire southern border and that cyberattacks have entered a more potent phase in their evolution.

How the Air Force is building resiliency

Compliance only gets you so far, explained one senior official.

Shutterstock image: protected hardware.

OPM still plagued by cyber weaknesses, IG finds

An oversight report found the Office of Personnel Management unready for its annual cyber audit, while the agency says that the CDM program will help mature agency efforts.

Harvey aerial Shutterstock id 706225081

Mapping destruction after Harvey and Irma

Analysis of high resolution satellite images yielded data that supported recovery efforts after Harvey and Irma.

Shutterstock.

What governments can learn from the original Russian cyber attack

Ten years after Estonia's networks came under siege from a Russian botnet, a group of officials gathered to discuss how the incident helped shape the future of cyber warfare.

Stock photo ID: 417891985 by GizaDog Shutterstock

FAA's plan to accelerate drone integration

FAA wants companies and local governments to work together on tests to support more low-altitude commercial drone use.

Cyber. Covered.

Government Cyber Insider tracks the technologies, policies, threats and emerging solutions that shape the cybersecurity landscape.

More from 1105 Public Sector Media Group