Exec Tech

Trump official

Trump security plan calls for consequences for cyberattacks

President Trump's first National Security Strategy called for improving risk management and resilience, but remained vague on authorities and coordination.

Shutterstock image 625972778 linux sql

Air Force shells out $26K in daylong bug bounty event

During a live-hacking event in New York City earlier this month, 25 security researchers uncovered nearly 60 unknown vulnerabilities.

Shutterstock image: streaming data of the human mind.

AI and machine learning: Looking beyond the hype

The explosion of data and increasingly powerful algorithms are combining to transform federal agencies.

Shutterstock image by madpixblue Stock vector ID: 160719833

Lawmakers set oversight agenda for IT modernization

Leaders on the House Oversight Committee offered a first look at plans for oversight of MGT Act implementation.

Shutterstock image (by razum): fusion of human and artificial intelligence.

Congress wants to set the stage for AI regs

A new bill would establish a federal advisory committee to examine the impact of AI.

Shutterstock image: illuminated connections between devices.

FCC CTO worries about a world without net neutrality

Ahead of Thursday's historic vote to repeal the Obama administration's open internet rules, the Federal Communications Commission's CTO Eric Burger penned concerns over whether internet providers would throttle and block access to websites.

780th Military Intelligence Brigade conduct cyberspace operations during a training rotation for the 2nd Stryker Brigade Combat Team, 2nd Infantry Division, at the National Training Center at Fort Irwin, Calif., Jan. 24. 2016; (Photo Credit: U.S. Army photo)

Lessons learned from training Army combat units in cyber ops

The Cyber Electromagnetic Activities pilot initiative focused on equipping tactical commanders and brigades with cyber and information operation techniques.

Shutterstock image.

New malware targets critical physical infrastructure

A newly discovered and potent form of malware targets industrial controllers to cause physical damage.

Agile Development Stock Image

Help wanted: Senior agile leaders needed

The government must invest in making agencies' senior IT program managers real agile leaders.

Shutterstock ID 623134292  By Dmitry Guzhanin.

The MGT Act is law. Now what?

Congressional appropriators still must allocate the money for agencies to use the central fund MGT creates. And if they do, how can agencies take advantage of the newly created modernization funds?


USCIS looks go big on biometrics

The immigration agency is developing rules to more aggressively use iris, voice and rapid DNA technologies.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

Mirai botnet perpetrators plead guilty

The Department of Justice announced plea deals for three individuals for orchestrating the Mirai botnet attack, which leveraged over 300,000 internet of things devices to wreak havoc on internet infrastructure companies.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.