Exec Tech

Image of the Pentagon

Why DIUx shouldn't exist

While DIUx is addressing defense innovation and acquisition shortfalls, experts say the need for a procurement acceleration program shows just how broken the acquisition process is.

NIST's school for cyber

The federal government's standards setter is offering agencies advice on how to implement the cybersecurity framework.

Warner wants updates on feds' software patching

In the wake of the global WannaCry ransomware attacks, one senator wants assurances that the federal government is patching its systems.

Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

Where the MGT money will go

Tech leaders are already planning how to spend the money in the Modernizing Government Technology Act.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

ShadowBrokers threaten to release more NSA tools

The cryptic ShadowBrokers are threatening to release more stolen NSA hacking tools through a new subscription service unless someone buys all the data from them.

Will Hurd

MGT Act headed for House vote with slimmed-down CBO score

The revised IT modernization bill will cost $500 million to implement, according to the Congressional Budget Office.

Shutterstock image.

Why disclosure rules didn't prevent the WannaCry attack

The WannaCry ransomware attack that crippled computers across the globe exploited a vulnerability that Microsoft had patched well in advance, but countless users failed to update their systems in time.

Cyberattack, financial services

NSA exploit behind global ransomware attack

An exploit based on hacking tools stolen from the National Security Agency is behind a global ransomware attack affecting tens of thousands of computers.

illustration dollar sign in vise

A $20B argument for passing the MGT Act

How to shift leverage back to government deal-makers and fund IT modernization from within.

Shutterstock image: mobile device security, continuous monitoring concept.

Social Security takes a second crack at two-factor authentication

Almost a year after rolling back a mobile phone-based authentication plan for its public beneficiary services, the Social Security Administration unveils a new approach.

Trump signs cyber order

Federal IT and legacy systems are at the heart of a long-awaited executive order on cybersecurity signed May 11 by President Trump.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

What does the internet of things mean for data breaches?

Regulators say new troves of hackable data created by connected devices make the need for a national data breach standard that much more urgent.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

More from 1105 Public Sector Media Group