Exec Tech


Shutterstock image: cyber eye.

Too soon to tell if CBP biometric systems can scale

DHS efforts to develop entry/exit systems that capture travelers’ biometric data are making progress, a GAO report finds, but full implementation is far from simple.

Shutterstock image (by MaximP): network defense.

VA seeks permanent CISO

The Department of Veterans Affairs is looking to hire a permanent IT security lead.

Michael Rogers

Rogers: Why data is critical infrastructure

The head of the NSA says that in the wake of Russia's hacking of the Democratic National Committee, the U.S. has to rethink what critical infrastructure means in a digital age.

Shutterstock image. Copyright: Ivan Cholakov

Close calls with unmanned aircraft increase

The number of close encounters between civilian aircraft and unmanned drones in national airspace is on the rise, the FAA reports.

computer network

How Einstein changes the way government does business

The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

Shutterstock image: data lines forming a sphere.

The future of open data in the Trump administration

Government transparency advocates expect Obama-era open data policies to continue but would like to see agencies and Congress prioritize their expansion.

sphere of binary data

How to define cyber-enabled economic warfare

The U.S. and the international community have yet to agree to standard definitions of cyber attacks and cyber-enabled economic warfare, and that's hindering effective policy responses to attacks, according to a new report.

Shutterstock image (by deepadesigns): Safety concept, closed padlock on a digital background.

More states say DHS scanned election systems

Reports from two more states say their election systems were scanned without authorization by DHS during election season.

Shutterstock image: digital record management.

Will agencies get the full value of their information?

According to a recent survey, gaps between existing skill sets and new requirements could hinder records management outcomes.

Shutterstock image (by GlebStock): hacker with graphic user interface.

The proper perspectives on defending against insider threats

The National Industrial Security Policy Operating Manual is a solid start, but agencies and contractors can't approach this as a compliance exercise.

Connecticut Secretary of State Denise Merrill

States balk at election system move by DHS

A group of state officials formally opposed the DHS critical infrastructure designation for election systems and want it rescinded.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

Why the private sector shouldn't rely on feds for cybersecurity

Despite cybersecurity policy advances, former DHS officials say the private sector should not expect much help from the government with hacks and breaches.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group