Nextgov - All Contenthttp://www.nextgov.com/Federal technology news, best practices, and web 2.0 tools.en-usTue, 07 Jul 2015 13:18:11 -0400DHS Launches Federal Government's First FOIA Apphttp://www.nextgov.com/mobile/2015/07/dhs-becomes-first-agency-create-foia-app/117097/The Department of Homeland Security has released an app designed to make it easier for the public to request government documents under the Freedom of Information Act.Hallie GoldenTue, 07 Jul 2015 13:18:11 -0400http://www.nextgov.com/mobile/2015/07/dhs-becomes-first-agency-create-foia-app/117097/MobileTech Tools That Let You Get Closer to Sharkshttp://www.nextgov.com/mobile/2015/07/tech-tools-let-you-get-closer-sharks/117085/A round-up of apps, websites, and livecams that will get you close—but not too close—to hammerheads, great whites, and other ocean beasts.Adrienne LaFrance, The AtlanticTue, 07 Jul 2015 11:40:40 -0400http://www.nextgov.com/mobile/2015/07/tech-tools-let-you-get-closer-sharks/117085/MobileMogens Trolle/Shutterstock.comPost-breach, Interior Has ‘Mandated’ Computer Users Sign On with Smart Cardshttp://www.nextgov.com/cybersecurity/2015/07/post-breach-interior-has-mandated-computer-users-sign-smart-cards/117046/The majority of individuals with high-level control over Interior data and networks needed only a password to log in.Aliya SternsteinTue, 07 Jul 2015 11:34:51 -0400http://www.nextgov.com/cybersecurity/2015/07/post-breach-interior-has-mandated-computer-users-sign-smart-cards/117046/CybersecurityOrhan Cam/Shutterstock.comShould Google Ever Lie to Us?http://www.nextgov.com/big-data/2015/07/should-google-ever-lie-us/117082/Search-engine architects must decide when their creations should act as a kind of expert and when they should neutrally direct people to what they are seeking.Conor Friedersdorf, The AtlanticTue, 07 Jul 2015 11:29:32 -0400http://www.nextgov.com/big-data/2015/07/should-google-ever-lie-us/117082/Big DataTwinsterphoto/Shutterstock.comEric Holder: The 'Possibility Exists' That Edward Snowden Could Come Homehttp://www.nextgov.com/defense/2015/07/eric-holder-possibility-exists-edward-snowden-could-come-home/117079/“I certainly think there could be a basis for a resolution that everybody could ultimately be satisfied with,” the former attorney general said.Dustin Volz, National JournalTue, 07 Jul 2015 11:22:29 -0400http://www.nextgov.com/defense/2015/07/eric-holder-possibility-exists-edward-snowden-could-come-home/117079/DefenseNational Security Agency leaker Edward Snowden appears on a live video feed broadcast from Moscow at an event sponsored by the ACLU Hawaii in Honolulu.Marco Garcia/APNew HHS CTO Wants Employees to Devote Time to Passion Projectshttp://www.nextgov.com/cio-briefing/2015/07/new-hhs-cto-proposes-making-open-source-standard-it/117016/In her first month as CTO, Susannah Fox proposed the department structure time for employee-driven creative projects in each operating division.Mohana RavindranathMon, 06 Jul 2015 16:58:50 -0400http://www.nextgov.com/cio-briefing/2015/07/new-hhs-cto-proposes-making-open-source-standard-it/117016/CIO BriefingGil C/Shutterstock.comNew VA CIO Gets to Workhttp://www.nextgov.com/cio-briefing/2015/07/new-va-cio-gets-work/117028/LaVerne Council, a former IT executive at Dell and pharmaceutical giant Johnson & Johnson, took the oath of office Monday.Jack MooreMon, 06 Jul 2015 16:13:52 -0400http://www.nextgov.com/cio-briefing/2015/07/new-va-cio-gets-work/117028/CIO BriefingLaVerne Council, VA's CIOVeteran Affairs DepartmentOPM Hiring IT Staff to Work on Cyber Upgradeshttp://www.nextgov.com/cybersecurity/2015/07/opm-hiring-it-staff-work-cyber-upgrades/117013/The agency that suffered three big data breaches needs $170,000 project managers to move forward with a computer upgrade.Aliya SternsteinMon, 06 Jul 2015 15:41:23 -0400http://www.nextgov.com/cybersecurity/2015/07/opm-hiring-it-staff-work-cyber-upgrades/117013/CybersecurityDonna Seymour, CIO of OPMCliff Owen/APResearchers Building Microchips That Mimic Live Human Organs http://www.nextgov.com/health/health-it/2015/07/researchers-building-microchips-mimic-live-human-organs/116992/The Human Organs-on-a-Chip bested 75 other finalists in the 2015 Design of the Year.Anne Quito, QuartzMon, 06 Jul 2015 13:34:35 -0400http://www.nextgov.com/health/health-it/2015/07/researchers-building-microchips-mimic-live-human-organs/116992/Health - Health ITRobert Lucian Crusitu/Shutterstock.comHillary Clinton: China Hacks Into 'Everything That Doesn’t Move'http://www.nextgov.com/cybersecurity/2015/07/hillary-clinton-china-hacks-everything-doesnt-move/116989/The former secretary of state accused China of stealing large amounts of government information.Jake Flanagin, QuartzMon, 06 Jul 2015 13:27:24 -0400http://www.nextgov.com/cybersecurity/2015/07/hillary-clinton-china-hacks-everything-doesnt-move/116989/CybersecurityManuel Balce Ceneta/APFBI Director James Comey Says He’s ‘Not a Maniac’ About Encryptionhttp://www.nextgov.com/cybersecurity/2015/07/fbi-director-james-comey-says-hes-not-maniac-about-encryption/116986/Previewing a round of testimony before Congress later this week, James Comey warned that too-tough-to-crack encryption allows bad actors to “communicate with impunity.”Dustin Volz, National JournalMon, 06 Jul 2015 13:25:28 -0400http://www.nextgov.com/cybersecurity/2015/07/fbi-director-james-comey-says-hes-not-maniac-about-encryption/116986/CybersecurityFBI director James ComeyEvan Vucci/AP File PhotoIn the Future, We’ll All Use Our Phones to Identify Ourselveshttp://www.nextgov.com/technology-news/tech-insider/2015/07/future-well-all-use-our-phones-id-devices/116962/The most successful mobile identity services highly depend on collaboration between public authorities, banks, telecom operators and the private sector.Neville PattinsonMon, 06 Jul 2015 13:09:39 -0400http://www.nextgov.com/technology-news/tech-insider/2015/07/future-well-all-use-our-phones-id-devices/116962/News - Tech InsiderAlexey Boldin/Shutterstock.comHackers Spy on Federal Investigator, Get Into Harvard Illegally and Email Themselves School Secretshttp://www.nextgov.com/cybersecurity/2015/07/hackers-spy-federal-investigator-get-harvard-illegally-and-email-themselves-school-secrets/116914/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 06 Jul 2015 06:00:00 -0400http://www.nextgov.com/cybersecurity/2015/07/hackers-spy-federal-investigator-get-harvard-illegally-and-email-themselves-school-secrets/116914/CybersecurityTammy54/Shutterstock.comPentagon Contractors Rank Below Retailers and Banks When it Comes to Cybersecurityhttp://www.nextgov.com/cybersecurity/2015/07/pentagon-contractors-ranked-below-retailers-and-banks-when-it-comes-cybersecurity/116899/Pentagon suppliers score below hacked retailers and banks on cyber defense, according to industry-developed metrics.Aliya SternsteinSun, 05 Jul 2015 18:00:00 -0400http://www.nextgov.com/cybersecurity/2015/07/pentagon-contractors-ranked-below-retailers-and-banks-when-it-comes-cybersecurity/116899/CybersecurityA view of the National Cybersecurity and Communications Integration Center in Arlington, Va., Tuesday, Jan. 13, 2015, before President Barack Obama spoke. Obama renewed his call for Congress to pass cybersecurity legislation.AP Photo/Evan VucciQ: Why Congress is Jumping on the Open Source Bandwagonhttp://www.nextgov.com/emerging-tech/2015/07/interview-why-house-jumping-open-source-bandwagon/116851/Ben Balter, chief executive for code repository site Github, talked with Nextgov about last week's announcement.Mohana RavindranathThu, 02 Jul 2015 15:40:24 -0400http://www.nextgov.com/emerging-tech/2015/07/interview-why-house-jumping-open-source-bandwagon/116851/Emerging TechGil C/Shutterstock.comWhy Americans Don’t Trust the Government to Safeguard Their Datahttp://www.nextgov.com/cybersecurity/2015/07/do-consumers-trust-agencies-their-personal-information/116848/Many consumers do not have much faith in federal agencies keeping their personal information safe, according to a new report.Hallie GoldenThu, 02 Jul 2015 14:00:15 -0400http://www.nextgov.com/cybersecurity/2015/07/do-consumers-trust-agencies-their-personal-information/116848/Cybersecuritywk1003mike/Shutterstock.comAfter the OPM Breach, It’s Time for IT Organizations to be Accountablehttp://www.nextgov.com/technology-news/tech-insider/2015/07/after-opm-breach-its-time-some-accountability/116830/Modernized technology and formal standards like FISMA won’t be enough -- mindsets must change, too.Jeff GouldThu, 02 Jul 2015 10:43:36 -0400http://www.nextgov.com/technology-news/tech-insider/2015/07/after-opm-breach-its-time-some-accountability/116830/News - Tech InsiderA chart of data breaches is shown on Capitol Hill in Washington, Tuesday, June 16, 2015, as witnesses testify before the House Oversight and Government Reform committee's hearing on the Office of Personnel Management data breach. AP Photo/Cliff OwenDHS Alerts Public to OPM-Related Phishing Scamshttp://www.nextgov.com/cybersecurity/2015/07/dhs-alerts-public-opm-related-phishing-scams/116794/Emails claiming to come from the agency and contractor CSID might be after money, U.S. secrets or both, say experts.Aliya SternsteinWed, 01 Jul 2015 17:39:54 -0400http://www.nextgov.com/cybersecurity/2015/07/dhs-alerts-public-opm-related-phishing-scams/116794/CybersecurityVentura/Shutterstock.comVA CIO: OPM Breach Is a Lesson for All Employeeshttp://www.nextgov.com/cybersecurity/2015/07/va-cio-opm-breach-lesson-all-employees/116752/VA defends against 55,000 new malware variants every day, according to the agency.Mohana RavindranathWed, 01 Jul 2015 17:06:54 -0400http://www.nextgov.com/cybersecurity/2015/07/va-cio-opm-breach-lesson-all-employees/116752/CybersecurityAP File Photo/Charles DharapakIs the White House Skirting Governmentwide Cybersecurity Rules?http://www.nextgov.com/cybersecurity/2015/07/white-house-skirting-governmentwide-cybersecurity-rules/116779/The White House’s unclassified networks were breached by hackers last fall.Jack MooreWed, 01 Jul 2015 16:12:35 -0400http://www.nextgov.com/cybersecurity/2015/07/white-house-skirting-governmentwide-cybersecurity-rules/116779/CybersecurityOrhan Cam/Shutterstock.comHow Do We Stop Artificial Intelligence from Overpowering Humans?http://www.nextgov.com/emerging-tech/2015/07/if-ai-takes-over-world-it-will-be-humans-fault/116734/Legislation could help protect humankind before AI dominates the world, experts say.Hallie GoldenWed, 01 Jul 2015 13:54:03 -0400http://www.nextgov.com/emerging-tech/2015/07/if-ai-takes-over-world-it-will-be-humans-fault/116734/Emerging TechTatiana Shepeleva/Shutterstock.comData-Driven Government? Not Yet. Feds Still Manage by Hunchhttp://www.nextgov.com/cio-briefing/2015/07/data-driven-government-not-yet-feds-still-manage-hunch/116743/In a true data-driven culture, leaders need to be willing to rethink their plans and perhaps even change course based on what the data says, according to EPA CTO Greg Godbout.Jack MooreWed, 01 Jul 2015 12:50:59 -0400http://www.nextgov.com/cio-briefing/2015/07/data-driven-government-not-yet-feds-still-manage-hunch/116743/CIO BriefingNo, agencies don't really a "big data" button. Yet. Roobcio/Shutterstock.com Why Chief Data Officers Should Really be Chief Digital Officershttp://www.nextgov.com/technology-news/tech-insider/2015/07/why-chief-data-officers-really-should-be-chief-digital-officers/116722/Having a chief data officer is akin to the Army having a chief bullet officer or hospitals having a chief bandage officer.Andrew H. LaVanwayWed, 01 Jul 2015 10:51:25 -0400http://www.nextgov.com/technology-news/tech-insider/2015/07/why-chief-data-officers-really-should-be-chief-digital-officers/116722/News - Tech Insiderwww.BillionPhotos.com/Shutterstock.comState Department Posts Back Online after Tech Glitch Snarls Visashttp://www.nextgov.com/technology-news/2015/07/state-department-visa-issuing-posts-back-online-three-weeks-after-tech-glitch-found/116716/A hardware bug corrupted the agency’s database used for processing biometric information.Hallie GoldenWed, 01 Jul 2015 10:18:28 -0400http://www.nextgov.com/technology-news/2015/07/state-department-visa-issuing-posts-back-online-three-weeks-after-tech-glitch-found/116716/NewsSorbis/Shutterstock.comWhy the Lawsuit Against OPM over the Massive Data Breach Faces an Uphill Battlehttp://www.nextgov.com/cybersecurity/2015/07/why-lawsuit-against-opm-over-massive-data-breach-faces-uphill-battle/116701/Demonstrating damages have been suffered will be the challenge, legal experts say.Aliya SternsteinWed, 01 Jul 2015 09:20:01 -0400http://www.nextgov.com/cybersecurity/2015/07/why-lawsuit-against-opm-over-massive-data-breach-faces-uphill-battle/116701/CybersecurityOPM Director Katherine Archuleta, left, and others, are sworn in on Capitol Hill in Washington, Wednesday, June 24, 2015, prior to testifying before the House Oversight and Government Reform Committee hearing on recent cyber attacks. From left are, Archul(AP Photo/Susan Walsh)