Exec Tech


Shutterstock image (by NREY): digital fingerprint identification.

DHS turns to small businesses to tap blockchain tech

DHS has awarded $100,000 each to four small innovators to explore the use of blockchain for identity management.

Shutterstock image: breached lock.

High-profile hacks and the asymmetry of disclosure

Data leaks are impossible to reverse, so the best strategy is to prevent intruders from having prolonged, unfettered access to systems in the first place.

Shutterstock image.

Taking blockchain beyond bitcoin

Blockchain isn't just for bitcoin, and federal agencies might find other uses for the secure recordkeeping tool.

Shutterstock image. Copyright: Dgrilla.

Social Security rolls back two-factor mandate

The Social Security Administration is relaxing a recent security directive for beneficiaries, because of potential user inconvenience.

Shutterstock: Copyright: Igor Zh.

NNSA looks to map lightning before it strikes

The agency charged with protecting the nation’s nuclear weapons stockpile installed new sensors at its weapons components plant to better protect it from the heavens.

Shutterstock image (by Pavel Ignatov): digital email icon.

Treasury component to shift employees to cloud email

The Office of the Comptroller of the Currency will use Unisys to move to the cloud under a new contract.

Shutterstock image.  Copyright: Robert Kneschke

IRS sounds the alarm on new phishing scam

Professional tax preparers are targets in a new email scam that opens the door for keystroke-logger malware.

Shutterstock image. Copyright: Michele Paccione.

Census taps Mandiant for cyber assessment

The Census Bureau selected a vendor on a sole-source basis to assess its vulnerability -- and announced plans to hire a CISO.

Shutterstock image of a data center.

GSA assists agencies with data center consolidation

GSA helping federal agencies manage OMB data center directive.

Shutterstock image: digital interface.

Cyber commission wants public ideas for bolstering IT security

The Commission for Enhancing National Cybersecurity has issued a request for information to inform its recommendations on how to strengthen IT security in both the public and private sectors.

Shutterstock image: meet and greet silhouettes.

Government influence at hacker conferences grows

As the government's need for skilled IT specialists grows, Las Vegas information security conferences have become a nontraditional recruiting ground for federal employers.

Cybersecurity research

GSA's internal IT is OK, watchdog says

The General Services Administration gets high marks on an inspector general IT security assessment.

FCW in Print

In the latest issue: grid security, agile development, BYOD and more!

More from 1105 Public Sector Media Group