Exec Tech


Shutterstock image.

Ex-White House officials call for reform of zero-day disclosures

Having a clearly-defined vulnerability equities process bound by an executive order would build public trust and improve accountability, according to Ari Schwartz and Rob Knake

Image from Shutterstock.com

VA taps UL for medical device cybersecurity

Testing and science firm UL will help the VA with a plan to protect connected medical IT from cyberattacks.

Shutterstock image: cooperation, pieces to the puzzle.

Bill aims to put local, state fusion center reps in NCCIC

New bill would open federal cyber fusion HQ to state and local agencies to share cyberthreat info.

Shutterstock image.  Copyright: Robert Kneschke

U.S. agency targeted by advanced spear phishing

An advanced hacking group likely compromised a foreign ministry email account and sent malware-laced email to a U.S. agency, according to Palo Alto Networks researchers.

IRS 990 form data in XML format (Image from Amazon Web Services)

IRS goes XML with tax-exempt forms

The tax agency is making tax-exempt filings available in machine-readable format.

MSPB logo

One year after outage, MSPB shakes up tech shop

The Merit Systems Protection Board is reassigning its long-serving CIO in the wake of a systems outage that continues to ripple through the agency.

Shutterstock image (by ra2studio): young businessman looking at a cloud concept wall.

6 steps to creating a hybrid integration strategy

A successful plan for using public and private cloud-based technology requires flexibility and an understanding of current and future needs.

Shutterstock image (by NREY): digital fingerprint identification.

Sen. Sessions wants fingerprints for visitors entering and exiting the U.S.

Biometric identity data for a visa entry and exit system should boil down to fingerprints, says the chairman of a Senate immigration subcommittee.

Shutterstock image.

Why should feds care about blockchain?

Federal standards setters can't predict how blockchain might serve government ends, but secure voting, health records and identity management are possible applications.

Shutterstock image: breached lock.

ISIS-linked hacker pleads guilty to targeting feds

A Kosovar named Ardit Ferizi stole the personally identifiable information of over 1,000 U.S. military and federal personnel, authorities said.

Is DHS cyber info-sharing ready for prime time?

Recent cybersecurity law is supposed to provide a voluntary framework for easy information sharing between government and private companies, but some DHS programs are experiencing early real-world hitches.

Russian Tupelov Tu154

Hill leaders look to block upgrade in Russian surveillance gear

Russia is seeking to upgrade the digital camera it uses in U.S. surveillance flyovers permitted under the Open Skies Treaty, but some in Congress are hoping to block the move.

FCW in Print

In the latest issue: grid security, agile development, BYOD and more!

More from 1105 Public Sector Media Group