Exec Tech


Shutterstock image (by bestfoto77): cloud network security lock.

Box brings milspec security to its entire platform

DOD's authorization for Impact Level 4 means controls for sensitive unclassified information are now in place for all customers. FedRAMP High authorization is in the works, and will also be platform-wide.

Air Force invites hackers to a friendly dogfight

The Air Force is the latest military service to partner with HackerOne on a bug bounty competition where hackers can win prize money by finding vulnerabilities in Air Force sites.

Director of National Intelligence James Clapper (Photo by Michael Bonfigli, Christian Science Monitor)

Clapper: Russia, nonstate actors emboldened in digital world

Russia has been emboldened by its successful intervention in the 2016 election, and nonstate actors, such as WikiLeaks, are a growing threat in the digital space, said former director of national intelligence James Clapper during a ranging public appearance.

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

Why the CDM program needs an overhaul

By focusing on legacy attack vectors, DHS’ cybersecurity program fails to address rapidly evolving new threats.

Participants from FCW

CDM in the trenches

DHS, GSA and customer agencies discuss deployment efforts and ideas for future improvement.

orchestration (sheff/Shutterstock.com)

Orchestrating security technology

To tackle advanced threats in an ever more complex cyber world, agencies must integrate all their security tools, data and processes.

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

Report: Pawn Storm a growing cyber threat

The cyber espionage group known as Pawn Storm, which was involved in hacking the Democratic National Committee, is increasingly focused on manipulating public opinion, says one cybersecurity firm.

Cyberattack, financial services

The Fed should do more to oversee financial sector cyber

With the financial sector under threat, the Federal Reserve should take a stronger hand in oversight of cyber defense, according to a new report.

Shutterstock image: cyber defense.

Can a voluntary framework deter cyberattacks?

With cyber attacks on the rise, experts wonder if voluntary norms are enough to keep the peace in cyberspace.

April 24, 2017 screenshot of opendata.epa.gov.  The message was changed later that day to say "The data on this site will continue to be available on April 28, 2017."

EPA's open data shutdown that wasn't

A notice on Opendata.EPA.gov warned the site would go dark on April 28, but the agency says it's "not going anywhere."

Rob Joyce NSA/WH

White House links innovation and cybersecurity

As the White House finalizes its cyber executive order, there are growing questions over how much the NSC will be driving cybersecurity and how much will be led by Jared Kushner's new innovation office.

Shutterstock editorial image (by Gil C): State Census Bureau homepage.

Census IT tackling a very long to-do list for 2017

In 2017, the bureau plans to award three IT contracts, scale up its systems, and nail down its partnership with USPS and with state and local governments to shore up its address records, all in time for its August 2017 dress rehearsal start date.

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group