Exec Tech

iStockPhoto / FCW

Can America thump China for the OPM hack – and should it?

Foreign relations experts tackle tough questions of how, and if, the U.S. should retaliate against China for the latter's suspected orchestration of the biggest act of cyber espionage in history.

Robert O. Work, Deputy Secretary of Defense.

DOD sets up cyber workforce council

The group will include members from the offices of the DOD CIO, Defense undersecretaries for personnel and readiness, policy, and intelligence, and the National Security Agency.

Shutterstock image (by alphaspirit): hidden identity of an individual under a mask.

How OPM breach victims can fight back

Credit monitoring and credit freezes are recommended, as is providing false information for security questions on social media, banking and other websites.

data door

Another lawsuit for OPM, Ashley Madison's government customers and more

News and notes from around the federal IT community.

Shutterstock image (by GlebStock): hacker with graphic user interface.

OPM: CDM will offer baseline security

The continuous diagnostics and mitigation program will give agencies a much-needed standard for reporting vulnerabilities.

Lawrence Livermore National Laboratory (LLNL) engineers Eric Duoss (left) and Tom Wilson use an additive manufacturing process called direct ink writing to develop an engineered “foam” cushion. Photo by George Kitrinos/LLNL

Creating the next-generation manufacturing world

Lawrence Livermore National Laboratory is teaming with Autodesk to research advanced applications for 3D printing.

Shutterstock image (by Maksim Kabakou): cyber defense conept, magnifying glass.

IG warns Labor on information security

Among other problems, the department had a history of failing to switch off access privileges for former employees.

Multiple Mobile Devices (Shutterstock)

GCN award winners announced, and State issues cell phone and IT solicitations

News and notes from around the federal IT community.

Shutterstock image (by Jozsef Bagota): Global networks.

ICANN handoff officially delayed

It will be at least another year before Internet domain naming and addressing functions are handed off to a global, multi-stakeholder body.

Richard Spires

The root causes of government IT insecurity

In the first of three columns, a former government executive discusses what's really needed to prevent another massive data breach.

Header image for Meritalk

Leaky data integration costs billions

A new study says bad data integration results in $342 billion in lost health care benefits every year.

Shutterstock image: password security.

Bigger IRS breach, institutionalizing PIF, and FAA drones and glitches

News and notes from around the federal IT community.