Exec Tech


hybrid cloud

Implementation plans for new cross-border data law remain cloudy

A month after its passage, we still don’t know which foreign countries would be able to access U.S.-based communications data under the CLOUD Act or when companies can reject their requests. Neither does Congress.

cloud computing (Shutterstock.com)

DOD says JEDI strategy coming May 7

At a Senate hearing, top Defense officials told lawmakers that a justification for the Pentagon's cloud procurement strategy called for in a recent spending bill will be submitted before the final request for proposals hits the street.

By Michael D Brown Royalty-free stock photo ID: 1921461 3D render of Earth - North America - at night, with Inter-city comm-links, flight paths, business connections, etc.

FAA reauthorization clears House

The House of Representatives passed a five-year reauthorization of the Federal Aviation Administration, sidelining efforts to privatize the agency and adding some cyber to its responsibilities.

Stock photo ID: 658810513 By asharkyu

EIS gets best-in-class handle

GSA's big, next-generation telecommunications contract, as well as its supporting contracts, get favored designation from OMB.

Dr. Ronny Jackson briefs the press on President Trump

Uncertainty at VA after nominee withdraws

With White House physician Adm. Ronny Jackson's withdrawal, VA watchers are wondering what's next for the agency and its planned $16 billion health IT modernization project.

secure network (vs148/Shutterstock.com)

What the latest defense bill has to say about cyber

After a key subcommittee markup, the 2019 National Defense Authorization Act is now headed for the full House Armed Services Committee.

By andriano.cz stock illustration ID: 319582172

DHS cyber strategy to land by mid-May

Homeland Security Secretary Kirstjen Nielsen told lawmakers the agency was looking at how to get into the bug bounty business.

Cyber Attack

House bill would create a 'naughty list' for nation-state hacking groups

The Trump administration's new cyber doctrine may be secret, but the administration and Congress are signaling their preferred strategies for responding to and deterring nation state cyberattacks.

paths (cybrain/Shutterstock.com)

IT modernization: Four ways to pay the tab

The Modernizing Government Technology Act can help bridge the budget gaps, but agencies need other funding sources to fully address decades of “technical debt.”

IoT

Agencies look to get smart on IoT

As connected devices proliferate, management and security prove challenging for agencies.

election security (Shutterstock.com)

Senator pushes for answers on scope of 2016 Russia voting probes

A DHS official acknowledged that more than 21 states could have been targeted by Russian hackers in the lead-up to the 2016 election.

By BeeBright shutterstock ID: 789734968

China's penetration of U.S. supply chain runs deep, says report

A new report sounds calls on the U.S. government and industry to develop a comprehensive strategy for securing the technology supply chain from foreign sabotage and espionage.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.