Exec Tech


(Photo credit: Drop of Light / Shutterstock.com)

Obama warns of U.S. weaknesses on cybersecurity

Hackers are targeting the White House, and the U.S. government still has much to learn from its IT security mistakes, the president said.

Image from Shutterstock.

VA looks to NITAAC for cloud

The Department of Veterans Affairs plans to conduct an upcoming cloud procurement using a National Institutes of Health acquisition vehicle.

Shutterstock image.

Europeans OK trans-Atlantic data deal

One of the major players involved in the lengthy U.S./EU data transfer agreement process gave the thumbs-up on July 8.

analytics concept art

Commerce to economists: Please use our data

The department's components are working hard to provide better data, but they need users to buoy the work through the tumultuous coming years.

Navigating NSA's Commercial Solutions for Classified program

Although the CSfC program is meant to streamline the certification process, primers like the one produced by the Institute for Critical Infrastructure Technology further simplify it.

Ben Tuttle NGA

NGA makes disaster-response app public

Making the Mobile Awareness GEOINT Environment app public is NGA’s latest move to contribute to an open-source geospatial community shaped by the private sector.

Shutterstock image (by alienant): An aerial view of the pentagon rendered as a vector.

DOD memo clarifies DIUX mission

The July memo seeks to put Defense Innovation Unit Experimental on firmer ground following criticism from Congress.

email

When using your own email server makes sense

Hillary Clinton’s decision to use a personal server likely arose from the antiquated state of technology at the State Department and her experience in the Senate.

 Shutterstock image: global health.

Pentagon raises payout in DHMSM hosting deal

The Pentagon is paying more than expected for the hosting portion of its coming electronic health record, and it is considering whether to find a separate vendor down the line.

Shutterstock IOT

FITARA, strategic sourcing could limit wireless IoT

FITARA and wireless BPAs are great, but they’re also potentially confining wireless device technology, a new study says.

Uber logo on car window

Uber, but for feds

Recently introduced legislation would open the world of modern transportation apps to federal reimbursement.

Shutterstock image (by Pavel Ignatov): Alert icon.

USPS flooded with false malware positives

The U.S. Postal Service's cyber incident system is overwhelmingly identifying normal activity as malicious, according to a new inspector general report.

FCW in Print

In the latest issue: grid security, agile development, BYOD and more!

More from 1105 Public Sector Media Group