Exec Tech


Shutterstock image: cyber eye.

How hunt operations can strengthen your security posture

Highly trained teams actively searching for evidence of hackers on the network can spot risks a security operations center might miss.

Shutterstock image.

Can the U.S. stop malware and buy it at the same time?

The U.S. government walks a fine line of prosecuting alleged hackers and buying malware and other software vulnerabilities.

Image from Shutterstock.com

CBP sets biometric tech at more airports

Customs and Border Protection adds airports in Houston and Las Vegas to its growing list of facilities with biometic exit technology.

Wikimedia Image: U.S. Cyber Command logo.

CYBERCOM to hold first-ever industry day

U.S. Cyber Command is looking to flex its new increased acquisition authority by sitting down with vendors in late October.

Federal student loan data targeted in fraud

Officials have declined to prosecute in a case where employees at a private firm tampered with a federal student loan database.

light bulb

GCN announces 2017 dig IT Award finalists

From mobile security to smarter transit to swarming drones, these 25 projects represent the best of discovery and innovation in government IT.

Old Post Office Building in Washington, D.C. (Photo: Wikimedia Commons)

Why tracking government spending on Trump-owned businesses is hard

Hill Democrats want answers on federal spending at Trump-owned businesses, but agencies might have a tough time supplying hard numbers.

Shutterstock image (by Robert Adrian Hillman): Abstract design for broken code.

VA's legacy systems aren't ready for the Data Act

A just-released oversight report reveals that the legacy systems at the Department of Veterans Affairs aren't ready to support many Data Act requirements.

Shutterstock image (by NREY): digital fingerprint identification.

What can the U.S. learn from the world's largest biometric ID system?

India's biometric identification program needs to better document how it's being used by the public and governments, according to independent researchers.

Shutterstock image: digital fingerprint.

Figuring out multifactor authentication

With NIST now restricting the use of Short Message Service, what are the authentication options for federal agencies?

Jeh Johnson

Amid DHS leadership shuffle, voting systems remain vulnerable

Continued resistance from state officials and some members of Congress is also an issue, says a former DHS chief.

cell towers (Shutterstock.com)

What it will take to make carriers bullish on EIS

Telecommunications service providers hope agencies don't play safe with EIS and instead lean on them for help with next generation services.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

More from 1105 Public Sector Media Group