Exec Tech


Shutterstock image.

Pentagon bounty program reveals 90 bugs

The high-profile and unprecedented program is uncovering vulnerabilities in Defense Department websites, and other federal agencies are taking notice.

Shutterstock image (by ra2studio): young businessman looking at a cloud concept wall.

Building an agile government with cloud-based analytics

A combination of public cloud and open-source technology could help agencies bridge the analytics gap.

Shutterstock image (by Aleksandar Mijatovic): Iranian flag.

House, Senate bills would urge more sanctions on Iranian hackers

The Iran Cyber Sanctions Act of 2016 would push the U.S. government to slap more sanctions on Iranian hackers.

Beth Cobert, OPM, official

OPM's sensitive data on feds still not encrypted

More than a year after the hack of federal personnel systems was revealed, the Office of Personnel Management is still unable to encrypt personal data on 4 million federal employees.

Shutterstock image: connecting individuals to one another through an access point.

Federal background checks could soon factor in social media

After years of planning, the Office of the Director of National Intelligence approved the incorporation of public social media feeds in security clearance investigations -- a move that could cost hundreds of millions of dollars.

Shutterstock image. Air Traffic Control.

Should airlines pay to get FAA tech past the 1990s?

The nation's air traffic control system is in dire need of stable funding. Is taking the checkbook away from Congress the answer?

Shutterstock image (by VLADGRIN): cloud concept surrounded by abstract computer network with integrated circles of communication.

FDA plans major IT refresh

The Food and Drug Administration is focusing on cloud and mobility in a coming technology overhaul.

sphere of binary data

Bill would require White House policy on cyberwar

Two senators have introduced legislation that would require the administration to create a policy for when a cyberattack crosses the boundary from a crime or nuisance to qualify as an act of war.

Border fence. Shutterstock image.

Embracing agile at the border

DHS components are discovering that transformation is best tackled one step at a time.

ODNI General Counsel Robert S. Litt, shown here testifying before the House Judiciary Committee July 17, 2013. Image captured from video feed.

New details on IC's insider threat patrol

Robert Litt, ODNI's top laywer, told a closed Senate hearing in 2012 about how intelligence agencies use data and computer systems to uncover potential insider threats.

Shutterstock image (by wavebreakmedia): doors opening to a sky of clouds and code.

FDIC shakeup over 'major incident' revelations

The agency is scrambling to shore up its internal cybersecurity practices as watchdogs scrutinize a spate of unauthorized employee data extractions.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

DHS warns on old SAP vulnerability

US-CERT issued a warning about a five-year-old SAP vulnerability that could still be a problem in unpatched systems.

Who are the Rising Stars?

Nominations for the 2016 Rising Star awards are now being accepted.

More from 1105 Public Sector Media Group