Exec Tech


Shutterstock image (by Aleksandar Mijatovic): Iranian flag.

House, Senate bills would urge more sanctions on Iranian hackers

The Iran Cyber Sanctions Act of 2016 would push the U.S. government to slap more sanctions on Iranian hackers.

Beth Cobert, OPM, official

OPM's sensitive data on feds still not encrypted

More than a year after the hack of federal personnel systems was revealed, the Office of Personnel Management is still unable to encrypt personal data on 4 million federal employees.

Shutterstock image: connecting individuals to one another through an access point.

Federal background checks could soon factor in social media

After years of planning, the Office of the Director of National Intelligence approved the incorporation of public social media feeds in security clearance investigations -- a move that could cost hundreds of millions of dollars.

Shutterstock image. Air Traffic Control.

Should airlines pay to get FAA tech past the 1990s?

The nation's air traffic control system is in dire need of stable funding. Is taking the checkbook away from Congress the answer?

Shutterstock image (by VLADGRIN): cloud concept surrounded by abstract computer network with integrated circles of communication.

FDA plans major IT refresh

The Food and Drug Administration is focusing on cloud and mobility in a coming technology overhaul.

sphere of binary data

Bill would require White House policy on cyberwar

Two senators have introduced legislation that would require the administration to create a policy for when a cyberattack crosses the boundary from a crime or nuisance to qualify as an act of war.

ODNI General Counsel Robert S. Litt, shown here testifying before the House Judiciary Committee July 17, 2013. Image captured from video feed.

New details on IC's insider threat patrol

Robert Litt, ODNI's top laywer, told a closed Senate hearing in 2012 about how intelligence agencies use data and computer systems to uncover potential insider threats.

Border fence. Shutterstock image.

Embracing agile at the border

DHS components are discovering that transformation is best tackled one step at a time.

Shutterstock image (by wavebreakmedia): doors opening to a sky of clouds and code.

FDIC shakeup over 'major incident' revelations

The agency is scrambling to shore up its internal cybersecurity practices as watchdogs scrutinize a spate of unauthorized employee data extractions.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

DHS warns on old SAP vulnerability

US-CERT issued a warning about a five-year-old SAP vulnerability that could still be a problem in unpatched systems.

keyhole digital

Achieving holistic cybersecurity

To be effective in their security efforts, agencies must be proactive -- using cyber analytics and cognitive-based systems to develop true security intelligence.

Cyber training. Shutterstock image.

Tabletop exercises a useful tool in cybersecurity testing

A senior DOD official said such exercises are among the most useful tools for cybersecurity testing, evaluation and training.

Who are the Rising Stars?

Nominations for the 2016 Rising Star awards are now being accepted.

More from 1105 Public Sector Media Group