Exec Tech


Shutterstock image. Copyright: wavebreakmedia

Trump tech aide touts DATA Act as 'model' for innovation

A few agencies will miss the May deadline to electronically submit their financial data, but robust support of spending data transparency from the White House, Congress and the private sector will keep the pressure on lagging agencies.

Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

OMB seeks more specific IT spending data

New guidance instructs agencies to break out investments for seven standard "support IT" categories.

Tom Price - HHS - senate confirmation

Price: Docs aren't 'data-entry clerks'

The nation's top health official wants to reduce the burden he says health IT regulation puts on practitioners.

Shutterstock image (by bestfoto77): cloud network security lock.

Box brings milspec security to its entire platform

DOD's authorization for Impact Level 4 means controls for sensitive unclassified information are now in place for all customers. FedRAMP High authorization is in the works, and will also be platform-wide.

Air Force invites hackers to a friendly dogfight

The Air Force is the latest military service to partner with HackerOne on a bug bounty competition where hackers can win prize money by finding vulnerabilities in Air Force sites.

Director of National Intelligence James Clapper (Photo by Michael Bonfigli, Christian Science Monitor)

Clapper: Russia, nonstate actors emboldened in digital world

Russia has been emboldened by its successful intervention in the 2016 election, and nonstate actors, such as WikiLeaks, are a growing threat in the digital space, said former director of national intelligence James Clapper during a ranging public appearance.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

Why the CDM program needs an overhaul

By focusing on legacy attack vectors, DHS’ cybersecurity program fails to address rapidly evolving new threats.

Participants from FCW

CDM in the trenches

DHS, GSA and customer agencies discuss deployment efforts and ideas for future improvement.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

Report: Pawn Storm a growing cyber threat

The cyber espionage group known as Pawn Storm, which was involved in hacking the Democratic National Committee, is increasingly focused on manipulating public opinion, says one cybersecurity firm.

orchestration (sheff/Shutterstock.com)

Orchestrating security technology

To tackle advanced threats in an ever more complex cyber world, agencies must integrate all their security tools, data and processes.

Cyberattack, financial services

The Fed should do more to oversee financial sector cyber

With the financial sector under threat, the Federal Reserve should take a stronger hand in oversight of cyber defense, according to a new report.

Shutterstock image: cyber defense.

Can a voluntary framework deter cyberattacks?

With cyber attacks on the rise, experts wonder if voluntary norms are enough to keep the peace in cyberspace.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group