• Defense

    Senate panel grills former Lockheed exec about potential conflicts

    John Rood, the Lockheed Martin executive nominated for undersecretary of defense for policy, is drawing questions on how he would treat his former firm.

  • Congress

    MGT passes Congress in 2018 NDAA

    The legislative push to get federal agencies up to speed on IT, eliminating creaky and expensive legacy systems will end with the president's signature.

  • Homeland Security

    Hiccups for CBP's new port system as it nears completion

    Customs and Border Protection's years-long march toward a unified import-export data system is nearing conclusion, but not without a couple of last-minute glitches.

  • Cybersecurity

    How to fix information sharing, according to industry

    Secret cyber threat data and a clunky clearance process are barriers to bidirectional information sharing, industry representatives told Congress.

  • Analytics

    Technologists, privacy advocates push back against algorithmic 'extreme vetting'

    The Trump administration's plan to use predictive software to rate threats posed by immigrants, refugees and asylum seekers will result in discriminatory decisions, say a group of privacy advocates and computer scientists.

  • Survey

    WT wants your take on the agency-contractor relationship

    Washington Technology is seeking government input for its latest survey.

  • Congress

    What's behind agency FITARA scores?

    Agencies shared the stories behind improved, declining and stable FITARA grades.

  • Cybersecurity

    New threats from North Korean malware

    The North Korean cyber threat expands to include attacks against aviation, financial services and government, according to new federal advisories.

  • Acquisition

    DISA embraces OTAs

    The DOD's IT shop is leveraging "other transaction authority" to buy leading-edge technology for prototypes and experiments.

  • Cybersecurity

    White House goes public with bug disclosure policy

    The Trump administration is pulling back the curtain a bit on the secretive process by which the government discloses (or retains) computer vulnerabilities.