Congressional advocates for legislation on voting security said the Trump order was welcome but didn't go far enough.
Students drawn to digital government are bringing desperately needed skills (and enthusiasm) to agencies that are willing to engage, Steve Kelman writes.
Customs and Border Protection's online portal for international maritime arrivals is moving to a mobile app.
Modern use of BPR can create cost savings by focusing on problem definition and clarity of roles and responsibilities vs. people's individual performance -- not by targeting budget or staff cuts.
Recent Department of Justice statements cast doubt around whether the Computer Fraud and Abuse Act would apply to hacked voting machines.
Can stakeholders and activists take this White House at its word that it is sincerely interested in advancing open data and open government policy?
Steve Kelman argues that government innovation needs more of the latter.
Homeland Security Secretary Nielsen said that by election day, 90 percent of registered voters will cast their ballot in areas with hardened election defenses.
A bid to advance a bipartisan election security bill out of committee is in limbo as pressure from states and voting tech vendors mounts.
As an election security bill heads toward markup in the Senate, two of the original cosponsors are divided over whether the bill should mandate that post-election audits be done by hand.
White House tech officials previewed coming personnel and modernization updates, including a new leader for a high-profile tech shop and the second round of Technology Modernization Fund awards.
The new Army Futures Command aims to meld all of the service's modernization efforts under one command, but for now the Army program executive officer structure will remain in place.
Many of the proposals to fix election security would likely have limited effect in the short term.
Tabletop training helps states, election officials and DHS see how election cybersecurity detection and response plans might work.
The FCC’s site went down last year not because of a DDoS attack, but because it couldn’t handle the traffic spike. So who’s responsible for making sure that doesn’t happen?
Sign up for our newsletter.
IT security and HR shops must align their policies and activities to tackle the threat of data exfiltration.
More Opinion that Matters