• Congress

    Lawmakers seek answers on alleged FCC DDoS attack

    Five Democratic senators are seeking an FBI investigation into possible cyberattacks on the Federal Communication Commission's online comment system. 05/31/2017

  • Cybersecurity

    ShadowBrokers launch subscription service for stolen NSA tools

    The enigmatic ShadowBrokers have launched a new subscription service in their latest attempt to monetize stolen NSA hacking tools. 05/31/2017

  • Budget
    David Shulkin briefs reporters at the White House

    VA chief will seek IT funding supplemental

    Once the Department of Veterans Affairs makes a decision on the future of its electronic health records system, it will seek money from Congress to put the plan into place. 05/31/2017

  • 2017 Rising Star Awards
    Rising Star 2013

    Help us find this year's Rising Stars

    Make your nominations today for federal IT's next generation of change agents. 05/31/2017

  • Shutterstock. Photo credit: Tupungato

    OMB seeks IT specialists

    The Executive Office of the President is looking to fill a quartet of IT jobs that call for secret and top secret clearances. 05/30/2017

  • man graphs performance

    Is the performance of the procurement system improving?

    Steve Kelman looks back on 20 years of attempted procurement reform. 05/30/2017

  • Drones
    Shutterstock image. Copyright: Ivan Cholakov

    White House seeks authority to track and destroy drones

    Under draft legislation, federal agencies would have the authority to disable or destroy drone aircraft deemed dangerous to government operations. 05/30/2017

  • Telecom
    Telecom VOIP Switch - Shutterstock

    Windstream drops EIS protest

    The company withdraws its pre-award protest of GSA's massive telecommunications contract, paving the way for an agency award. 05/30/2017

  • Cybersecurity
    Shutterstock image 625972778 linux sql

    Senators want a (bug) bounty on DHS

    Senators have introduced legislation to establish a Department of Homeland Security bug bounty program modeled on the Hack the Pentagon that would unleash white-hat hackers on agency systems. 05/30/2017

  • Veterans Affairs
    Shutterstock image: medical professional interacting with a futuristic, digital interface.

    VA looks at cut in tech funding

    While the Department of Veterans Affairs gets a budget bump in the administration's spending plan, the line item for IT comes in for a cut as the agency mulls shifting its tech strategy. 05/26/2017

  • Identity
    Shutterstock image. Copyright: Dgrilla.

    Can government stop using Social Security numbers?

    Agencies are having trouble reducing reliance on Social Security numbers as identifiers because of outdated systems, insufficient funding and lack of coordination from OMB. 05/26/2017

  • Cybersecurity
    Shutterstock image of a line of faulty code.

    What the PATCH Act doesn't do

    Proponents of the current Vulnerabilities Equities Process say the proposed PATCH Act will likely improve the process, but it is just one piece of a larger cybersecurity puzzle. 05/26/2017

  • Cybersecurity
    cyber attack button

    Congressman files new 'hack back' bill

    A new draft bill would allow private companies to use "active cyber defense measures" in response to a hack, but officials warn such measures could result in cyber escalation and unintended consequences. 05/26/2017

  • Congress
    Sen. Jerry Moran (R-KS) 2011 official portrait

    Moran pushes MGT in the Senate

    The MGT Act's Republican sponsor discusses the bill's prospects for passage. 05/26/2017

  • Comment
    Shutterstock images (by Ingka D. Jiw and Oberon): ballot box, budget/costs concept.

    IT acquisition reform's time is now

    Promising examples abound, but real leadership focus is needed to achieve meaningful digital government services and security. 05/25/2017