Exec Tech

Agile Development Stock Image

Agile at scale

Federal agencies are embracing agile development, but new ways of thinking are needed to make it work at government scale.

sphere of binary data

Learning to 'fight through the hurt'

Rear Adm. Danelle Barrett wants U.S. cyber forces to be able fight through "Puerto Rico levels" of devastation.

Shutterstock image: looking for code.

DHS: A 'vast majority' of agencies on track with Kaspersky directive

It is too soon to tell how long it will take to fully purge the embattled vendor from federal systems, according to a DHS official.

Shutterstock image: illuminated connections between devices.

Will warning labels shield users against insecure IoT?

A pair of Democratic lawmakers is backing new cybersecurity standards for connected devices, including a framework to identify and label products.

concept cybersecurity art

Dems see opportunity on cyber

The moderate New Democrat Coalition is looking for bipartisan support for a cybersecurity agenda focused on public-private cooperation.

Shutterstock image: healthcare digital interface.

Cerner looks to government for growth

Health record software provider Cerner is poised to capitalize on gains in the government market.

Image from FOSE: Maria Roat.

SBA CIO is 'burning bridges' to push modernization

Small Business Administration CIO Maria Roat said 2018 is all about consolidation and getting federal staff comfortable with ongoing cloud migration.

Shutterstock image. Copyright: wavebreakmedia

GSA looks for possible DUNS replacements

For the second time in 2017, the General Services Administration is requesting feedback on ways to reduce its reliance on a proprietary business entity identifier system it uses to track government contracts.

Some states look to feds for help replacing old voting equipment

A group of Democratic lawmakers heard from advocates for federal help in refreshing obsolete voting tech.


Trump tells FAA to move faster on drone traffic control

The administration has issued new mandates for accelerating the integration of unmanned aerial systems into the national airspace.

Agencies don't know where attacks are coming from

A risk report being produced under the cybersecurity executive order suggests that agencies need to get a better handle on where attacks are originating.

Shutterstock image: digital fingerprint, cyber crime.

Kaspersky: pirated software led to NSA contractor breach

The embattled cyber vendor claims an NSA contractor breach can be traced to a pirated version of Microsoft Word.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.