Exec Tech


Shutterstock.

Trump tells FAA to move faster on drone traffic control

The administration has issued new mandates for accelerating the integration of unmanned aerial systems into the national airspace.

Agencies don't know where attacks are coming from

A risk report being produced under the cybersecurity executive order suggests that agencies need to get a better handle on where attacks are originating.

Shutterstock image: digital fingerprint, cyber crime.

Kaspersky: pirated software led to NSA contractor breach

The embattled cyber vendor claims an NSA contractor breach can be traced to a pirated version of Microsoft Word.

Image from Shutterstock.com

Can agencies seize the moment for modernization?

There is "incredible alignment" in support of IT modernization, officials say, but better planning is needed to take full advantage.

Shutterstock image (by R.T. Wohlstadter): blue binary tunnel, fractal illustration.

Can DOD overcome its 'data hoarding' problem?

A senior Pentagon tech official said that when it comes to data protection, the Defense Department and other organizations must learn how to harness their data if they want to stay secure.

 Maksim Kabakou Stock illustration ID: 496942243

Can new law stop foreign-bought election ads?

Rep. Will Hurd (R-Texas) isn’t sold on the Senate bill aimed at increasing disclosure requirements for political ads on digital platforms, and instead pushed for government and industry to work together.

Tom Bossert

White House official fires back at McCain over cyber hearing 'stunt'

Homeland Security adviser Tom Bossert criticized Sen. John McCain (R-Ariz.) for marking a White House no-show at a hearing with an empty chair.

Chat bubbles. Shutterstock image.

DHS plan to collect immigrants' social media gets roasted in the comments

A proposal to update information collection on legal immigrants and naturalized citizens to include social media details is roundly criticized by privacy and immigrant advocates.

gold shield on top of computer code

How agencies can get in step with the cyber EO

The top three technologies for compliance with the cybersecurity executive order.

U.S. critical infrastructure under persistent attack, US-CERT says

The U.S. Computer Emergency Readiness Team warned of ongoing attacks targeting agency networks and infrastructure providers in aviation, energy, nuclear and water.

Rep. Trey Gowdy (R-S.C.) / Photo: House Oversight and Government Reform Committee

Gowdy: White House deleted text, social media apps from official phones

White House staff no longer have text or social media messaging apps on their official phones because of records management headaches, according to a letter from a key House overseer.

Shutterstock image (by Robert Adrian Hillman): Abstract design for broken code.

Equifax breach drives legislative push on data privacy

A House bill sets a deadline for companies to notify customers of data breaches and expands categories of data information covered as sensitive.

Cyber. Covered.

Government Cyber Insider tracks the technologies, policies, threats and emerging solutions that shape the cybersecurity landscape.

More from 1105 Public Sector Media Group