Exec Tech


Telecom VOIP Switch - Shutterstock

GSA names 10 primes for $50B EIS contract

GSA awarded contracts for the vehicle that will be the foundation for next-generation telecom and network services for the next decade and a half at federal agencies.

Rep. Terri Sewell (D-Ala.)

Lawmaker proposes cyber squad to educate campaign pros

Rep. Terri Sewell wants the federal government to take a hand in improving the cyber hygiene of political campaigns.

Image from Shutterstock.com

Wyden presses spy chief on surveillance powers

Sen. Ron Wyden wants the Trump administration to publicly state whether the FISA law applies to communications that are "entirely domestic."

Shutterstock image: illuminated connections between devices.

DOD risks 'rogue' apps under current IoT policy

A new GAO report called for the DOD to strengthen its policies and guidance for connected devices.

Lawmakers seek answers on agencies' use of Kaspersky tech

A House committee is asking federal agencies to turn over any records related to their use of software from a company suspected of having ties to the Kremlin.

Shutterstock image (Dencg) : digital government concept.

How to ensure successful deployment of new technologies

When crafting a deployment strategy, remember these five best practices.

Shutterstock image: filing cabinets.

Can agencies build greater trust in the FOIA process?

Agency officials hope that technology can help automate practices to make the government more transparent -- but they first need to improve the practices themselves.

data abstract

How to report cybersecurity strategies to senior leaders

Government agencies can look to the private sector for the proven elements of a successful executive briefing.

ORNL Single-Photon Source Approach for Quantum Encryption (Photo by Qubitekk)

Oak Ridge licenses its quantum encryption method

A commercial firm hopes to use the technique to help the energy sector protect power-grid data from cyberattacks.

Shutterstock image: illuminated connections between devices.

Re-evaluating the need for 'I' in IoT

A "network of things" might be a better way to describe and categorize elements of connected-device environments.

Shutterstock image: shadowed hacker.

ICS-CERT analyzing grid-crippling malware

ICS-CERT is teasing out signatures of a new family of malware to help identify code that targets critical infrastructure.

digital key

A security solution that's simple for government, tough for attackers

Format-preserving encryption can secure legacy systems and new solutions alike.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group