Exec Tech


Shutterstock image: open lock.

How to fix information sharing, according to industry

Secret cyber threat data and a clunky clearance process are barriers to bidirectional information sharing, industry representatives told Congress.

Image copyright: David Carillet / Shutterstock

New threats from North Korean malware

The North Korean cyber threat expands to include attacks against aviation, financial services and government, according to new federal advisories.

Shutterstock image: data analytics concept, blue.

What's behind agency FITARA scores?

Agencies shared the stories behind improved, declining and stable FITARA grades.

Shutterstock image. Artist credit: pixbox77

DISA embraces OTAs

The DOD's IT shop is leveraging "other transaction authority" to buy leading-edge technology for prototypes and experiments.

Shutterstock image: medical professional interacting with a handheld, tablet computer.

Health records vendor looks to settle lawsuit with VA

CliniComp wants to test its product's interoperability with VA and DOD electronic health records systems.

Shutterstock image: digital fingerprint, cyber crime.

DHS finds Kaspersky software at 15 percent of agencies

A DHS official told Congress that 96 out of 102 federal agencies have complied with a directive aimed at banning Kaspersky Lab products, with a handful of small agencies still working to do so.

Shutterstock Image ID: 702495127 By vectorplus

5 things to think about when modernizing agency IT

With the MGT Act poised to become law, it's a matter of when -- not if -- federal agencies will modernize legacy software and infrastructure.

Shutterstock image: open lock.

CDM and automation

The next frontier for Continuous Diagnostics and Mitigation.

sphere of binary data

NDAA pushes more oversight of cyber

With $8 billion dedicated to improving U.S. cyber capabilities, the NDAA has a host of policies geared toward boosting the cyber workforce and streamlining operations.

Shutterstock image: cloud interface.

GSA wants feedback on cloud contract language

A recent RFI seeks examples of effective and problematic contract language as well as suggestions on how to incorporate cloud services into different contract vehicles for direct solicitations, resellers and system integrators.

Bing Wen/Shutterstock.com

Why it's harder than you think to hack a voting machine

Despite the fear and hype, there are several obstacles that make the most direct form of tampering, altering vote counts, extremely difficult.

Rob Joyce NSA/WH

Joyce: Civilian cyber could use more discipline

The top White House cybersecurity adviser suggests civilian agencies could take a page from the Pentagon's handbook.

Nominate Today!

Nominations for the 2018 Federal 100 Awards are now being accepted, and are due by Dec. 23. 

More from 1105 Public Sector Media Group