Exec Tech


Shutterstock image (by ra2studio): social connection interface.

Watchdog: DHS social media screening lacks objectives

Two DHS components launched social media screening pilots in the wake of the San Bernardino shooting. The agency's internal watchdog wants to see improved coordination and measurable goals.

David Shulkin USH VA

VA chief swears off software development

In his most pointed comments on IT to date, David Shulkin, secretary of Veterans Affairs, said that the agency will move to off-the-shelf software.

FDIC leads agencies in major cyber incidents

The bank regulator was responsible for 10 of 16 major information security incidents recorded in the FY2016 FISMA report.

Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

IGs: budget cuts could put cybersecurity at risk

Inspectors general fear that budget cuts could force agencies to choose between spending on program operations and cybersecurity.

Industry calls for more cyber threat context from DHS

The Department of Homeland Security is not providing enough context around the cyber threat indicators it shares with the private sector for firms to use the data effectively, say industry leaders.

Drone battle - shutterstock image

DHS wants a look at anti-drone tech

DHS' Science and Technology directorate invites counter-drone technology companies to show off their capabilities, while military commanders warn about unauthorized drones near military bases.

Shutterstock image (by Tim Masters): okay sign emerging from a pile of shredded papers.

Chaffetz, Cummings push White House on records

A bipartisan letter from the House Oversight and Government Reform Committee seeks information on Trump administration compliance with federal recordkeeping laws.

Shutterstock image (Dencg) : digital government concept.

Report: Busiest federal websites have big problems

Of the 297 most visited federal websites, more than 90 percent fall short of "basic standards" for security, speed, accessibility or ease of mobile access.

Shutterstock image (by alienant): An aerial view of the pentagon rendered as a vector.

Report: Combatant commands vulnerable to cyber attacks

Despite making progress against cyber red teams, military combatant command missions are coming up short in defending against nation-state adversaries in training exercises.

Shutterstock image: breached lock.

WikiLeaks posts spy trove purporting to contain CIA hacking tools

Wikileaks launches what it claims is its largest-ever release of CIA data, which includes nearly 9,000 documents and files alleged to contain hacking tools and covert program details.

file folders on a background with binary code

Lawmakers target disappearing records

Two bills before the House Oversight committee deal with the problem of electronic records being altered or lost.

Shutterstock image: cloud network, concept.

5 technology priorities for President Trump

The Obama administration improved government technology, but the Trump team must push it further forward.