Exec Tech

Third Annual BitSight Insights Industry Benchmark Report (September 2015).

Federal cybersecurity: Not as bad as you might think

Despite a spate of major breaches, turns out the federal government has relatively good cybersecurity, at least according to a new study from BitSight Technologies.

Shutterstock image: monitoring factors of healthcare.

Cyber problems at HealthCare.gov, cyber sharing at the Pentagon and more

News and notes from around the federal IT community.

Shutterstock image (by kstudija): telecommunications radio tower.

EIS RFP might spill into October

GSA says it will set the fees agencies pay to use the telecom contracting vehicle “significantly” lower than originally planned.

Complexity (Shutterstock image)

How decision modeling can make for better government

Business decision logic is a type of data, and it's time agencies started treating it that way.

Shutterstock vectors (by rudall30 and nrey): deathly hallows symbol, fingerprint, and Einstein vector.

More stolen fingerprints, an Einstein contract, an invisibility cloak and more

News and notes from around the federal IT community.

DISA Director Lieutenant General Alan R. Lynn (left) and Deputy Chief Information Officer Gary C. Wang.

DISA cyber protection teams deployed

DISA's Lt. Gen. Alan Lynn has moved quickly to defend besieged Defense Department networks.

Rep. Darrell Issa

Can the next president be transparent if s/he tries?

It doesn't matter who the next president is, those pushing transparency and IT innovation in government will still be frustrated, says one of the Data Act's champions.

Shutterstock image (by chombosan): Wireless networking of vehicles.

Washington's role in hack-proofing cars: A light touch?

The threat of Internet-enabled car hacking looms large in the American psyche. But should agencies rush to put out rules, or can industry find its own way to secure vehicles?

soldiers using mobile device

Four years on, Army common operating environment takes shape

Army IT personnel are using code to integrate C2 nodes into a common architecture that is the backbone of the sensor computing part of the COE.

Shutterstock image: internet of things, connectivity.

Connecting the cyber and the physical

NIST is looking for feedback on its evolving framework for systems that connect the real world and the computer world.

Shutterstock image (by Ninya Pavlova and iunewind): unicorn vector on a digital background.

'We don't have a way to code good guy'

A "magical rainbow unicorn key" for encrypted devices may be what law enforcement wants, but such access could mean bad actors would also have access to data, privacy activists argue.

Shutterstock image: discussing a contract.

Navy NextGen RFI, cyber acquisition and more

News and notes from around the federal IT community.

The Fed 100

Nominations for the 2016 Federal 100 Awards are now being accepted. 

More from 1105 Public Sector Media Group