Exec Tech


Should election systems be considered critical infrastructure?

Voting machines and the databases behind them don't clearly fall into any of DHS' categories of critical infrastructure, but some experts say that should change.

Shutterstock image: checking documents.

GSA feedback for EIS bidders pushed back into August

Initial evaluations of proposals for the massive telecommunications contract were originally planned for late July.

compass innovation

DOD CIO calls for better industry collaboration on cyber

The Defense Department's Terry Halvorsen said technology firms must work together to craft better cybersecurity solutions.

What feds must do to get a handle on water data

Water resources are being stretched thin in drought-riddled parts of the U.S., but the government doesn't have the data it needs to monitor consumption and plan for the future.

Shutterstock image (by Ismagilov): restructuring business processes.

Federal digital transformation: What's next for USDS and 18F?

The government's digital teams have provided desperately needed skills, but government is an "at-scale" enterprise that cannot afford to wait for a small cadre of specialists to make its way around to everyone.

help wanted sign

GSA seeks IT exec to help with enterprise cloud

GSA wants an expert executive to help it with cloud and other transformational IT infrastructure efforts.

VA and VistA: Can they be fixed?

VA's homegrown electronic health record system is at an inflection point -- one that encapsulates the state of the agency's entire technology operation.

Shutterstock image: businessman holding workforce icons in his hands.

Cyber worker shortage hurting operations

Although the U.S. is in the top tier for educating new cybersecurity workers, the small talent pool is still a significant challenge for industry and government, according to a new survey.

Shutterstock image (by Maksim Kabakou): cyber defense conept, magnifying glass.

OMB issues A-130 update

The long-awaited update to Circular A-130 addresses a range of cybersecurity issues, including insider threats and feds' use of personal email accounts at work.

Shutterstock image: connecting individuals to one another through an access point.

Dispelling the myth of 'perfect' security

A new approach called micro-segmentation is easy to deploy, requires fewer security resources and could be the key to streamlining risk management.

5 habits of highly effective government power users

Successful power users are technically curious, skilled at communication and highly organized. And they are essential to the government's data revolution.

Shutterstock image: examining a line of code.

White House policy defines cyber roles

A new presidential policy directive clarifies the responsibilities of federal law enforcement, security and intelligence agencies in responding to significant cyber incidents.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

More from 1105 Public Sector Media Group