Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.
The living document builds off the administration's push for a more open government.
Studies estimate that for every federal dollar spent on NASA, the economy is boosted by as much as $14.
An update to the Defense Department’s cloud computing strategy aims to decentralize the process for purchasing commercial cloud solutions
The Marshals also are testing a small number of Windows 8 tablets and Android-based smartphones.
Lapses in cybersecurity leave hospital records and patients' medical devices open to exploitation.
Problems with a backup system are preventing Pentagon from recovering Forge.mil.
Unclear rules about sharing phone data with researchers hamper wider adoption.
US Marshals Migrate from BlackBerrys to iPhones
The Marshals also are testing a small number of Windows 8 tablets and Android-based ...
Drones and Mistletoe: What Could Go Wrong?
Let us commence discussion on T.G.I. Friday's drone for holiday cheer and forced romance.
DHS Kills Dreaded Biometric Deportation Program
… and replaces it with a new controversial biometric deportation program.
DHS Set to Destroy Governmentwide Network Surveillance Records
"Einstein" critics are happy to see the metadata go, but not about ...
VA’s Aggressive Plan for Shedding Its 'Back-to-the-Future' Era Scheduling System
VA is now taking bids for commercial software to replace a ...
What a Privacy Activist Turned Top White House Adviser Thinks About Cybersecurity
One-time civil liberties activist now forges compromises ...
CIA’s Official Book Reviewer Unimpressed with Tomes on Snowden
The spy agency describes Glenn Greenwald’s recent book as full of “bitter ad ...
Senate Vote to Rein in NSA Spying Falls Short
The defeat marks an abrupt setback for the post-Snowden movement to curb U.S. spying practices.
Will Veterans' Data Ever Truly Be Secure?
"Every day, industry is finding new ways that things can be exploited," VA CIO told Congress.
Watchdog: VA Still Not Doing Enough to Address IT Vulnerabilities
VA information security weaknesses are again in the crosshairs of the ...