There are no items to display
  • Shutterstock image (by Bruce Rolff): eyes in a binary tunnel.

    ODNI lobbies for FISA 702 reauthorization

    While trying to avoid a government shutdown will be the first order of business when Congress returns, the Office of the Director of National Intelligence is upping pressure on lawmakers to focus on reauthorizing the foreign surveillance powers under FISA Section 702. 04/20/2017

  • Shutterstock image (by Andrii_M): computer binary code.

    DHS updates on data mining

    Analytical tools support efforts at Department of Homeland Security to detect terrorist plots, money laundering, illegal trade schemes and more. 04/20/2017

  • Shutterstock image

    Is IT exempt from Trump's 'Buy American' order?

    Given the global supply chain, determining the national provenance of a piece of technology is a tricky business. And in any case, Congress long ago carved out an exception for commercial IT products. 04/19/2017

  • Shutterstock image (by alienant): An aerial view of the pentagon rendered as a vector.

    JIDO goes agile, but can DOD?

    The Joint Improvised-threat Defeat Organization has spent the last five years implementing an agile DevOps framework, but scaling that across the DOD is another challenge altogether. 04/19/2017

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market. 04/18/2017

  • Shutterstock image

    Navigation moves indoors

    By using the data generated from smartphone sensor readings, radio frequency signal strengths and GPS fixes, NIST hopes developers can build indoor navigation apps that can be validated against fixed locations. 04/18/2017

  • John Kelly -DHS official photo

    DHS Secretary cryptic on cyber

    In his first public speech as Secretary of Homeland Security, John Kelly said government networks are constantly being bombarded, but he offered few details on any new cyber policies or initiatives. 04/18/2017

  • Defense Department CIO Terry Halvorsen (Photo: Michael Bonfigli)

    Terry Halvorsen joins Samsung

    The former DOD CIO is taking a senior role with the Korean electronics manufacturer. 04/17/2017

  • Shutterstock image: global information exchange.

    IG: DISA needs a 3-year ATO for collaboration tool

    The Pentagon's inspector general said DISA has complied with software management procedures for the lifecycle management of Defense Collaboration Services, but needs to mitigate risk levels to obtain a full 3-year authority-to-operate. 04/17/2017

  • Shutterstock image. Copyright Sergey Nivens.

    Microsoft says it's all patched up

    The latest Shadow Brokers release of alleged NSA hacking tools included a trove of Microsoft exploits, but the software giant says it has now patched all of the vulnerabilities in the leaked code. 04/17/2017

  • Shutterstock image (by everything possible): Businessman choosing an individual over time.

    House panel nudges Trump over IGs

    The chairman and ranking member of a key oversight committee want the Trump administration to find candidates for 11 open inspector general posts. 04/17/2017

  • Social Security Administration Logo

    IG: SSA system reboot success depends on backlog

    The Social Security Administration's reboot of a failed $300 million IT system for its disability program is being rolled out gradually, and it's getting good marks so far. 04/14/2017

  • handshake

    DHS wants help bringing new tech to market

    The department's Science and Technology Directorate wants help commercializing the technology it helps develop. 04/14/2017

  • Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

    Shadow Brokers leak trove of NSA hacking tools

    The mysterious Shadow Brokers group has have released a trove of alleged NSA hacking tools including Windows zero-day exploits and tools designed to hack into the global SWIFT banking system. 04/14/2017

  • M2M cyberthreat protocol is ready for prime time

    The second generation of STIX, the structured language for conveying cyberthreat information on a machine-to-machine basis, is nearing completion. 04/14/2017

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group