Latest Items


There are no items to display
  • Cybersecurity
    Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years. 10/24/2016

  • Oversight
    18F logo

    18F finances in disarray, watchdog warns

    A new report says 18F has lost $36 million to date, "repeatedly overestimated revenue" and pushed back its projected break-even date to 2020. 10/24/2016

  • Shutterstock image.

    Analysis paralysis in government?

    Finding a balance between studying a problem to death and taking swift action can be tricky, but there are signs that federal managers are trying to address the challenge. 10/24/2016

  • Workforce
    Shutterstock image. Copyright: Albert H. Teich

    Trump promises federal hiring freeze

    In a weekend policy speech, the Republican presidential nominee announced plans to trim the federal workforce by attrition. 10/24/2016

  • magnifying numbers

    Watchdogs honored at IG awards

    Members of the federal inspector general community were honored for their tech oversight achievements at the 19th annual CIGIE awards. 10/21/2016

  • Defense
    Detail of the Space Surveillance Telescope’s structure. Photo courtesy Department of Defense.

    DARPA transfers powerful space telescope to the Air Force

    The Air Force Space Command is taking over operations of a sophisticated telescope built to survey and track space debris and satellites. 10/21/2016

  • Cybersecurity
    Shutterstock image.

    Pentagon names firms to run bug bounty program

    The Defense Department developed a contract vehicle that will let DOD components launch crowdsourced bug bounty campaigns to identify and remedy vulnerabilities in digital defenses. 10/21/2016

  • Big Data
    Shutterstock image: data wall.

    Commerce taps big-data development partners

    The Commerce Department's National Technical Information Service has chosen 35 companies and academic organizations to capitalize on the federal government's vast data assets. 10/21/2016

  • Comment
    Shutterstock image.

    There’s still hope for IT modernization funding

    There is more than one way to pay for modernization efforts at federal agencies. 10/21/2016

  • Cybersecurity

    Think tank: U.S. elections are far from hack-proof

    Despite frequent reassurances from intelligence and security officials that the U.S. voting system can't be hacked, one cybersecurity think tank is warning that hacking the election is not only possible, but relatively easy. 10/20/2016

  • Privacy
    Image from Shutterstock.com

    OMB director announces new digital privacy office

    The White House is creating a new digital privacy office and senior career position to oversee agency privacy and data collection programs. 10/20/2016

  • Census
    Shutterstock image. Copyright: Michele Paccione.

    Census calls off 2017 field tests, cites funding uncertainty

    Bureau officials said the decision to cancel the upcoming tests is not ideal, but it is "the best overall operation remaining amid current uncertainty" about fiscal 2017 funding. 10/20/2016

  • Cybersecurity
    Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

    Bank regulators mull new cyber standards

    The three banking regulatory agencies that oversee large U.S. financial institutions are seeking comments on proposed new standards for cyber resilience. 10/20/2016

  • Cybersecurity
    Wikimedia image: The U.S. Navy variant of the F-35 Joint Strike Fighter, the F-35C, conducts a test flight over the Chesapeake Bay.

    Red teaming isn't easy

    Cybersecurity testing and contract specifications that industry takes for granted can be a bear to implement in some federal IT contracts. 10/20/2016

  • Cybersecurity
    Shutterstock image: shadowed hacker.

    NSA: Hackers find an easy path to U.S. systems

    A senior NSA official says that none of the major hacks of U.S. systems in the last two years relied on zero-day exploits. Instead, they took advantage of easier vulnerabilities resulting from poor cyber hygiene and practices. 10/19/2016

The Fed 100

Nominations are now being accepted for the 2017 Federal 100 Awards.

More from 1105 Public Sector Media Group