Exec Tech

HHS security goes back to basics

Don't plug smartphones into medical machines. Log off your computer. Keep your password to yourself. The medical community has plenty of room to improve when it comes to keeping critical data safe.

Shutterstock image (by deepadesigns): Safety concept, closed padlock on a digital background.

After the cyber sprint: 14 agencies meet Tony Scott's mark

The federal CIO published a scorecard showing how agencies had boosted -- or, in some cases, failed to boost -- their strong authentication implementation during the government cyber security sprint.

Shutterstock image (by robuart): application development, program code.

An explainer on containers

If containers continue to advance into federal enterprise IT, they could spell the end of monolithic legacy applications.

computer network

In first policy speech, DIA director prioritizes ICITE

Lt. Gen. Vincent Stewart pledges to drive an ambitious intelligence community IT project forward.

Shutterstock image (by Tale): working on a digital tablet.

A vote of confidence for USPTO telework

After questions were raised about a pioneering agency's productivity, an outside review suggests improvements -- but declares the telework program essentially sound.

iStockPhoto / FCW

China hacking map, getting behind Einstein and Alabama cyber

News and notes from around the federal IT community.

FCW magazine June 30 issue icon set.

How 'fog computing' makes the IoT run

The push to put processing power on the network's edge can be a valuable complement to cloud computing.

Shutterstock image: the White House.

OMB developing cyber guidance for contractors

New guidelines will be aimed at bolstering contractor cybersecurity in the wake of breaches that originated with vendors.

Shutterstock image (by adhike): hacker over a screen with binary code.

PSC takes on OPM, FBI lags on info sharing, Joint Chiefs' email crashes and more

News and notes from around the federal IT community.

FCW magazine

Buy or build? For IT, it's custom vs. COTS

It's a timeless question — and the answer might not be as clear-cut as agencies think.

Shutterstock image: cloud hands.

Army issues guidance for commercial cloud migration

The guidance stipulates that commands bear ultimate responsibility for ensuring that systems and applications within their portfolios are rationalized.

Shutterstock image: breached lock.

CRS scrutinizes the OPM breach

A new report serves as a useful backgrounder for anyone looking for a quick yet detailed review of the circumstances surrounding the breach.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

More from 1105 Public Sector Media Group