Exec Tech


Shutterstock image: breached lock.

High-profile hacks and the asymmetry of disclosure

Data leaks are impossible to reverse, so the best strategy is to prevent intruders from having prolonged, unfettered access to systems in the first place.

Shutterstock image.

Taking blockchain beyond bitcoin

Blockchain isn't just for bitcoin, and federal agencies might find other uses for the secure recordkeeping tool.

Shutterstock image. Copyright: Dgrilla.

Social Security rolls back two-factor mandate

The Social Security Administration is relaxing a recent security directive for beneficiaries, because of potential user inconvenience.

Shutterstock: Copyright: Igor Zh.

NNSA looks to map lightning before it strikes

The agency charged with protecting the nation’s nuclear weapons stockpile installed new sensors at its weapons components plant to better protect it from the heavens.

Shutterstock image (by Pavel Ignatov): digital email icon.

Treasury component to shift employees to cloud email

The Office of the Comptroller of the Currency will use Unisys to move to the cloud under a new contract.

Shutterstock image.  Copyright: Robert Kneschke

IRS sounds the alarm on new phishing scam

Professional tax preparers are targets in a new email scam that opens the door for keystroke-logger malware.

Shutterstock image. Copyright: Michele Paccione.

Census taps Mandiant for cyber assessment

The Census Bureau selected a vendor on a sole-source basis to assess its vulnerability -- and announced plans to hire a CISO.

Shutterstock image of a data center.

GSA assists agencies with data center consolidation

GSA helping federal agencies manage OMB data center directive.

Shutterstock image: digital interface.

Cyber commission wants public ideas for bolstering IT security

The Commission for Enhancing National Cybersecurity has issued a request for information to inform its recommendations on how to strengthen IT security in both the public and private sectors.

Shutterstock image: meet and greet silhouettes.

Government influence at hacker conferences grows

As the government's need for skilled IT specialists grows, Las Vegas information security conferences have become a nontraditional recruiting ground for federal employers.

Cybersecurity research

GSA's internal IT is OK, watchdog says

The General Services Administration gets high marks on an inspector general IT security assessment.

Shutterstock editorial image (by Gil C): State Census Bureau homepage.

House panel wants update on Census IT risks

As the 2020 enumeration draws ever closer, key lawmakers want assurances that the Census Bureau is managing risks in IT acquisition.