Exec Tech

Shutterstock image (by a-image): connected devices around the world.

Why agencies must work harder to prep for IOT security

The Department of Homeland Security Assistant Secretary for Cyber Policy Robert Silvers stressed government's need to accelerate issuing security solutions for the internet of things.

Rental cars can be data thieves, warns FTC

The Federal Trade Commission reminds consumers that rental cars can be a vector for data theft via their onboard IT systems.

Secret Service preps new threat database

The U.S. Secret Service is retiring older systems that track threats to protectees, including the president and presidential candidates.

Shutterstock image. Copyright: Albert H. Teich

House Democrats question Trump-Russia connections

Senior House Democrats want the FBI to probe Republican presidential nominee Donald Trump's ties to "Russian interests" in connection with recent hacks.

Image copyright to FBI: James Comey.

FBI wants deeper conversation on encryption

The head of the FBI wants a less strident discussion about the strong encryption technology that is becoming standard on electronic devices and hampering investigative efforts.

world map

Lawmakers want cyber on the agenda at the G20 summit in China

Six U.S. lawmakers sent a letter to the president asking him to prioritize a discussion of cyberattacks on financial institutions during his upcoming trip to China.

concept cybersecurity art

Report: Cyber enhances military power -- and vulnerabilities

As the Defense Department increases its reliance on digital capabilities, the Center for a New American Security says the tactical gains come with increased vulnerabilities.

Shutterstock image. Copyright: style-photography.

U.S. and EU need secure threat sharing

The U.S. and the EU are building up their information sharing networks to address the growing threat of global terrorism, and a central challenge is keeping the shared intelligence secure.

Voting machines are critically vulnerable

The U.S. voting infrastructure is potentially easy prey for hackers because of disparate systems and inadequate security, according to a new report.

Beth Angerman. Official photograph.

USSM builds on shared services

GSA's year-old shared services office laying the groundwork for new marketplace ecosystem.

Shutterstock image.

How HPCs crunch rivers of water data

Lawrence Livermore National Laboratory has come up with a way to use its supercomputing power to speed the sprawling data analysis associated with extremely complex public works.

Shutterstock image (by Tim Masters): okay sign emerging from a pile of shredded papers.

How to construct tomorrow's information management professional

The government lacks the workforce to handle the exponential growth of information and information assets.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

More from 1105 Public Sector Media Group