Exec Tech


Shutterstock image (by Pavel Ignatov): Alert icon.

White House tweaks incident reporting in FISMA memo

Agencies get an updated definition of a cyber incident in a recent Federal Information Security Modernization Act memo.

Shutterstock image.

Army announces bug bounty program

Based on the "Hack the Pentagon" bug bounty program, the Army's effort will let military personnel and government civilians find vulnerabilities in the Army's recruiting websites.

Shutterstock image: government access keyboard.

OMB updates 12-year-old federal website policy

The Office of Management and Budget is looking for more functionality, security, privacy and oversight of agencies' public-facing websites.

Image from Shutterstock.com

Is our IT infrastructure crumbling, too?

Moving to IP-based networks is the answer -- if the right tools are deployed to ensure security.

Emily A. Antos

Emily E. Antos

Assistant Program Manager, Engineering Sea Warrior Program, Space and Naval Warfare Systems Center Atlantic, Department of the Navy

Shutterstock image: breached lock.

Why cyber needs to be front and center in the transition

Experts warn that past transitions have ignored the lessons learned by outgoing administrations, and the stakes are so high now that the Trump Administration needs to heed the advice of Obama's cyber officials.

Shutterstock image (by Makkuro GL): crowdsourcing innovation.

CTOs can't agree on what CTOs do

What does a federal chief technology officer do? It depends.

soldiers using mobile device

Palantir ruling could tweak Army's innovation track

Two top Army officials reflect on some of the innovation accomplishments of the Obama administration and the challenges that lie ahead for the incoming Trump administration.

Shutterstock image.

Can government guide industry to better cyber info-sharing?

The NTIA is hoping to nudge industry to improve collaboration on disclosing cyber vulnerabilities.

Shutterstock image (by Pavel Ignatov): Alert icon.

ISPs can help thwart DDoS attacks, but authorities may be lacking

As the recent attack on a key internet support company shut down other major online companies, telecom providers were ready to help but faced a legal obstacle.

Shutterstock image.

HPC: Fueling the government’s next-generation technology programs

Government and industry have an opportunity to democratize high-performance computing by making it more accessible to nontechnical users.

All's quiet on the election cyber front, so far

Despite earlier hacks and official concerns that Russia or others would seek to sabotage the U.S. elections, there was little sign of malicious cyber activity through most of Election Day. But that doesn't mean all is well.

The Fed 100

Nominations are now being accepted for the 2017 Federal 100 Awards.

More from 1105 Public Sector Media Group