Exec Tech


Gerry Connolly_2015 Eagle

Connolly: Choppy waters ahead for civilian agency IT

FedRAMP, 18F and the federal workforce as a whole face uncertain futures in the next administration, according to Rep. Gerry Connolly.

Warner: No red or blue cybersecurity teams

One of the Senate's most tech-savvy members sees some common ground on cybersecurity in the post-election environment.

Ron Ross of the National Institute of Standards and Technology (NIST).

NIST's new take on IoT security

NIST's new guidance on security for the internet of things is not prescriptive like FIPS but instead offers a foundation for engineering security into connected devices.

Image from Shutterstock.com

Internet giants want Trump to back strong encryption

Forty of the most recognizable internet companies want to make sure their policy priorities -- which include data security, strong encryption and immigration reform -- are considered by the Trump administration from Day One.

power tower

What to look for in cyber policy during Trump's first 100 days

As the new administration comes on board, leaders must understand the cybersecurity relationships protecting critical infrastructure, according to one expert.

Shutterstock image (by Pavel Ignatov): Alert icon.

White House tweaks incident reporting in FISMA memo

Agencies get an updated definition of a cyber incident in a recent Federal Information Security Modernization Act memo.

Shutterstock image.

Army announces bug bounty program

Based on the "Hack the Pentagon" bug bounty program, the Army's effort will let military personnel and government civilians find vulnerabilities in the Army's recruiting websites.

Shutterstock image: government access keyboard.

OMB updates 12-year-old federal website policy

The Office of Management and Budget is looking for more functionality, security, privacy and oversight of agencies' public-facing websites.

Image from Shutterstock.com

Is our IT infrastructure crumbling, too?

Moving to IP-based networks is the answer -- if the right tools are deployed to ensure security.

Emily A. Antos

Emily E. Antos

Assistant Program Manager, Engineering Sea Warrior Program, Space and Naval Warfare Systems Center Atlantic, Department of the Navy

Shutterstock image: breached lock.

Why cyber needs to be front and center in the transition

Experts warn that past transitions have ignored the lessons learned by outgoing administrations, and the stakes are so high now that the Trump Administration needs to heed the advice of Obama's cyber officials.

Shutterstock image (by Makkuro GL): crowdsourcing innovation.

CTOs can't agree on what CTOs do

What does a federal chief technology officer do? It depends.