Exec Tech

analytics concept art

Big data and disasters

A new report from a DHS advisory board spells out what government can do to maximize the use of big-data analytics in national security and emergency situations.

Will Hurd

Hurd: Hospitals shouldn't look to government for cyber protection

Rep. Will Hurd offered blunt advice to hospitals as the healthcare industry faces an epidemic of cyber attacks.

Shutterstock image.

Turning baseball jerseys into bullet-catchers

CBP leaders are interested in how wearables and the Internet of Things could come together to help create an automated picture of what law enforcement officers are going through.

Shutterstock Image

Is DHS' Einstein now blocking porn on federal networks?

Einstein 3 Accelerated is adding web content filtering to the arsenal of anti-malware defenses, and a side effect of the move could be to block pornography on agency computers.

Rep. Darrell Issa

Issa: Better standards needed for IoT

Rep. Darrell Issa joined industry and agency experts in urging a proactive approach to security and privacy standards for the Internet of Things.

Shutterstock imag (by Benjamin Haas): cyber coded team.

Stopping the federal IT security brain drain

To secure the talent they need, agencies must either find a way boost pay or fundamentally change the government-contractor relationship.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

DISA unveils new cybersecurity review

The agency is adopting an agile, "outside-in" approach to assessing the security of the Department of Defense Information Network.

Shutterstock image: mobile device security, continuous monitoring concept.

FTC seeks to patrol mobile patching

The regulator is taking a look at how mobile device manufacturers conduct periodic security updates.

Vice President Joseph Biden. White House photo.

Biden, Burwell call for collaboration on health data

Vice President Joe Biden calls for more open data to fuel big picture public health efforts, including the administration's "moonshot" bid to cure cancer.

broken lock

Leading by example: the federal CISO and cybersecurity collaboration

Signature-based security and outdated data strategies are just two of the challenges that need serious government-wide attention.

Shutterstock image: government access keyboard.

18F wants to experiment with design standards

The federal government's in-house design and usability consultancy would like sites to be clean and consistent but not necessarily uniform.

NIST looks to transform federal authentication

The National Institute of Standards and Technology is planning "transformational" changes to its technical guidelines for digital authentication.

FCW in Print

In the latest issue: grid security, agile development, BYOD and more!

More from 1105 Public Sector Media Group