Exec Tech


DHS logo

DHS elevates Driggers to senior cyber post

Rick Driggers is moving to the deputy slot at the Office of Cybersecurity and Communications at DHS.

DOD Common Access Cards

DOD pushes toward CAC replacement

Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

iStockPhoto / FCW

Trump targets China for IP policies

A new presidential memorandum tasks the U.S. Trade Representative with addressing China’s policy of compelling foreign companies to divulge trade secrets in exchange for access to the Chinese markets.

Shutterstock image. Copyright: Michele Paccione.

Census walks back tech solution to population count

The Census Bureau expects to nearly double the number of in-person household visits -- and in turn, the total burden hours -- during its critical dress rehearsal test.

Navy person using keyboard

Expanding the cyber talent pool

Attracting younger and more diverse talent to fill the growing federal cybersecurity skills gap requires outreach from agencies as well as some prompting from Congress.

Image: Shutterstock

Energy Department releases code to count bats in the dark

Pacific Northwest Laboratory researchers are making the thermal imaging software available to energy companies to help with offshore wind turbine siting.

Shutterstock imag (by Benjamin Haas): cyber coded team.

How the Army is driving the cyber-EW merger

The Army Cyber Center of Excellence is providing unified cyber and electronic warfare training to its soldiers.

Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

DOT watchdog finds flaws in IT working capital spend

An oversight report criticizes the Transportation Department's administration of an IT working capital fund.

Shutterstock image: cyber eye.

How hunt operations can strengthen your security posture

Highly trained teams actively searching for evidence of hackers on the network can spot risks a security operations center might miss.

Shutterstock image.

Can the U.S. stop malware and buy it at the same time?

The U.S. government walks a fine line of prosecuting alleged hackers and buying malware and other software vulnerabilities.

Image from Shutterstock.com

CBP sets biometric tech at more airports

Customs and Border Protection adds airports in Houston and Las Vegas to its growing list of facilities with biometic exit technology.

Wikimedia Image: U.S. Cyber Command logo.

CYBERCOM to hold first-ever industry day

U.S. Cyber Command is looking to flex its new increased acquisition authority by sitting down with vendors in late October.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

More from 1105 Public Sector Media Group