Exec Tech


Shutterstock image

Can federal purchasing power counteract botnets?

New guidance required under the cybersecurity EO suggests that government purchasing power could induce tech manufacturers, especially in the emerging IoT space, to market more secure devices.

Shutterstock image (by Pavel Ignatov): Alert icon.

Feds face limited options for Meltdown, Spectre bugs

Patches can mitigate some of the vulnerabilities found in virtually every processor, but a DHS spokesperson said decisions on hardware replacement will be left up to individual agencies and CIOs.

Shutterstock image (by Pavel Ignatov): digital email icon.

Securing government email is a critical step for U.S. cybersecurity

Agencies could soon be leaders in authenticating email, but there still much work to be done.

Chat bubbles. Shutterstock image.

IARPA awards translator tech contracts

The intelligence community's research arm taps major research universities, NIST to create a universal text translator for analysis work.

Image: Shutterstock

Will 2018 be the year for blockchain for government?

Government application of the ledger technology lags behind the hype, but expect more experiments to take off in the coming months.

Multiple Mobile Devices (Shutterstock)

Congress requires mobile-friendly websites

The Connected Government Act requires all new or redesigned federal websites to scale to mobile screens.

E-mail circling the globe

Email hygiene mandate takes hold at agencies

While nearly half of federal domains have put policies in place to alert against email spoofing, there's a lot more work to be done.

Photo credit: John Roman Images / Shutterstock.com

All in for FirstNet

The planned national wireless interoperable emergency responder network got 100 percent buy in, but some stakeholders needed some prodding.

Bipartisan Senate bill would boost election security aid to states

The measure seeks to boost the level of federal support to state local officials in order to protect the nation's election infrastructure from foreign cyber interference.

Management abstract

GSA looks to staff up IT modernization teams

Solicitation covers start-up staffing needs for five separate Centers of Excellence to "manage centralized, function-specific talent, solutions and acquisition vehicles."

Time to fix the TIC

Why modernizing trusted internet connection requirements will help speed agencies' path to the cloud.

DHS plans to step up cyber agreements with private companies

DHS is looking at increasing the use of proactive agreements with critical infrastructure entities to prevent and mitigate cyberattacks.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.