Exec Tech


Shutterstock image: illuminated connections between devices.

DOD risks 'rogue' apps under current IoT policy

A new GAO report called for the DOD to strengthen its policies and guidance for connected devices.

Lawmakers seek answers on agencies' use of Kaspersky tech

A House committee is asking federal agencies to turn over any records related to their use of software from a company suspected of having ties to the Kremlin.

Shutterstock image (Dencg) : digital government concept.

How to ensure successful deployment of new technologies

When crafting a deployment strategy, remember these five best practices.

Shutterstock image: filing cabinets.

Can agencies build greater trust in the FOIA process?

Agency officials hope that technology can help automate practices to make the government more transparent -- but they first need to improve the practices themselves.

data abstract

How to report cybersecurity strategies to senior leaders

Government agencies can look to the private sector for the proven elements of a successful executive briefing.

ORNL Single-Photon Source Approach for Quantum Encryption (Photo by Qubitekk)

Oak Ridge licenses its quantum encryption method

A commercial firm hopes to use the technique to help the energy sector protect power-grid data from cyberattacks.

Shutterstock image: illuminated connections between devices.

Re-evaluating the need for 'I' in IoT

A "network of things" might be a better way to describe and categorize elements of connected-device environments.

Shutterstock image: shadowed hacker.

ICS-CERT analyzing grid-crippling malware

ICS-CERT is teasing out signatures of a new family of malware to help identify code that targets critical infrastructure.

digital key

A security solution that's simple for government, tough for attackers

Format-preserving encryption can secure legacy systems and new solutions alike.

Shutterstock Image: Navy signal lantern

Navy makes old signals new again

A new project will bring a 200-year-old seaborne communications technology into the current digital ocean.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

The enterprise risk management approach to cybersecurity

Better cybersecurity tools are not even half the battle.

Shutterstock image: cloud technology connections.

How cloud can take open data to new heights

By removing the storage and transmission barriers, agencies are seeing the use of their datasets explode.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group