Exec Tech


threat

IG details OPM contractor's security flaws

KeyPoint Government Solutions, which intruders used to hack the Office of Personnel Management, lacked a formal incident response plan and controls on unauthorized devices, according to the agency's IG.

Shutterstock image: social media.

NARA looks to lead on social media archiving

In seeking a social media archiving tool, the National Archives is setting an example for agencies in advance of 2019 governmentwide electronic records goals.

Photo credit: Alexey Boldin / Shutterstock.com

GOP candidates weigh in on the Apple court order

Republican presidential candidates put IT security front and center in a town hall event in the wake of a court order to Apple to help unlock a suspected terrorist's iPhone.

Shutterstock image: medical professional monitoring a patient

Why DOD cares about hospital network attacks

A senior Defense Department official calls for better technology and increased cooperation when it comes to hardening health IT equipment and preventing hacks into medical institutions.

Telecom VOIP Switch - Shutterstock

Vendors still have questions as $50B telecom deadline approaches

As the deadline looms for contract proposal submission for its huge telecom contract, GSA looks towards transition

Photo credit: Alexey Boldin / Shutterstock.com

Apple balks at court order to unlock San Bernardino shooter’s iPhone

A District Court judge has ordered Apple to help the FBI break into the iPhone of one of the San Bernardino shooters. Many technologists are up in arms, and Apple is not backing down.

Shutterstock image (by Everett Historical): aerial of the Pentagon.

Pentagon moves on Windows upgrade

Defense Secretary Ash Carter's office is drafting an "executive action" letter that would help expedite DOD's transition to Windows 10.

Shutterstock image: the White House.

Obama names picks for cyber commission

A presidential commission aimed at sizing up the nation's cybersecurity is getting a leader with government background and a vice chairman from industry.

Shutterstock image:  Capitol building in Washington, D.C.

Why senators need a CISO

Users might be daredevils or they might not fully understand their cybersecurity risks, said the man in charge of protecting U.S. senators' networks. Either way, CISOs have to work with what they've got.

U.S. Department of State

State changes counterterrorism unit to include online focus

Deputy Secretary of State, Antony Blinken, announced a changes at the Bureau of Counterterrorism and Countering Violent Extremism to combat terrorism online and work with tech firms.

Shutterstock image: connecting individuals to one another through an access point.

State IG finds lack of IT contingency plans overseas

Consulates and embassies are expected to be able to restore connectivity in the event of disruptive events, but the IG found a range of issues with 20 of the 29 posts it reviewed.

John Brennan

Cyberwar keeps CIA's Brennan up at night

CIA Director John Brennan said a terrorist attack on American soil is inevitable, the Paris attack resulted from a "failure of intelligence" and the growing threat of cyberwarfare is "the thing that keeps me up at night."

FCW in Print

Check out the digital edition of FCW magazine -- the federal IT community's premier publication.

In this issue: Profiles of every Fed 100 winner, the government and industry Eagle Award winners and more.

More from 1105 Public Sector Media Group