Nextgov - All Contenthttp://www.nextgov.com/Federal technology news, best practices, and web 2.0 tools.en-usFri, 06 Mar 2015 17:02:49 -0500FTC Pits Humans Against Robocalls in New Contesthttp://www.nextgov.com/emerging-tech/2015/03/ftc-pits-humans-against-robocalls-new-contest/106941/The FTC is looking for anyone who can block, forward and predict which phone calls are made by automated systems.Mohana RavindranathFri, 06 Mar 2015 17:02:49 -0500http://www.nextgov.com/emerging-tech/2015/03/ftc-pits-humans-against-robocalls-new-contest/106941/Emerging TechVideo: Open Data and Citizen Engagementhttp://www.nextgov.com/big-data/2015/03/video-open-data-and-promoting-citizen-engagement/106932/The fifth installment in our collaboration with Socrata's Open Data TV.Caitlin FairchildFri, 06 Mar 2015 15:51:41 -0500http://www.nextgov.com/big-data/2015/03/video-open-data-and-promoting-citizen-engagement/106932/Big Datara2studio/Shutterstock.comBrit Allegedly Extracted Data from Pentagon Satellite Systemhttp://www.nextgov.com/cybersecurity/2015/03/brit-allegedly-extracted-data-pentagon-satellite-system/106935/The data compromised includes employee contact information and mobile device ID numbers.Nextgov StaffFri, 06 Mar 2015 15:35:34 -0500http://www.nextgov.com/cybersecurity/2015/03/brit-allegedly-extracted-data-pentagon-satellite-system/106935/CybersecurityFrontpage/Shutterstock.comHackers Con Telecom IT Support Worker, Bilk Mandarin Oriental Guests and Trigger Bogus Bomb Alarm at a Mallhttp://www.nextgov.com/cybersecurity/2015/03/hackers-con-telecom-it-support-worker-bilk-mandarin-oriental-guests-and-trigger-bogus-bomb-alarm-mall/106929/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 06 Mar 2015 14:58:21 -0500http://www.nextgov.com/cybersecurity/2015/03/hackers-con-telecom-it-support-worker-bilk-mandarin-oriental-guests-and-trigger-bogus-bomb-alarm-mall/106929/CybersecurityGordon Bell/Shutterstock.comSenators: We Need a National Strategy for the Internet of Thingshttp://www.nextgov.com/emerging-tech/2015/03/senators-introduce-internet-things-resolution/106905/The bipartisan group urged the United States to articulate a national strategy for developing, and deploying, the 'Internet of Things.'Mohana RavindranathFri, 06 Mar 2015 13:20:04 -0500http://www.nextgov.com/emerging-tech/2015/03/senators-introduce-internet-things-resolution/106905/Emerging TechSenate Armed Services Committee member, Sen. Deb Fischer, R-Neb.J. Scott Applewhite/APNew CIO Wants Fresh Pair of Eyes to Look at Federal IT Problemshttp://www.nextgov.com/cio-briefing/2015/03/new-federal-cio-wants-fresh-pair-eyes-look-federal-it-problems/106911/The IT Solutions Challenge will consist of several working groups of “rising stars” from the IT world tasked with zeroing in on tech issues in the federal government.Jack MooreFri, 06 Mar 2015 13:11:26 -0500http://www.nextgov.com/cio-briefing/2015/03/new-federal-cio-wants-fresh-pair-eyes-look-federal-it-problems/106911/CIO BriefingMaksim Kabakou/Shutterstock.comCable and Telecom Giants Are Taking the FCC to Court Over Net Neutrality Ruleshttp://www.nextgov.com/cio-briefing/2015/03/cable-and-telecom-giants-are-taking-fcc-court-over-net-neutrality-rules/106893/Here are three arguments cable and telecom giants are likely to use to try to kill the rules.Brendan Sasso, National JournalFri, 06 Mar 2015 12:27:58 -0500http://www.nextgov.com/cio-briefing/2015/03/cable-and-telecom-giants-are-taking-fcc-court-over-net-neutrality-rules/106893/CIO BriefingFCC Chairman Tom WheelerJose Luis Magana/APWhy the Mobile Industry Wants to Kill the Passwordhttp://www.nextgov.com/mobile/2015/03/why-mobile-industry-wants-kill-password/106896/As data rather than voice or text becomes the big reason people use their mobile phones, networks want to extract more value from their users.Leo Mirani, QuartzFri, 06 Mar 2015 12:21:08 -0500http://www.nextgov.com/mobile/2015/03/why-mobile-industry-wants-kill-password/106896/MobileDenys Prykhodov/Shutterstock.comAttention, Cyber Pros: The Pentagon Wants You -- 3,000 of Youhttp://www.nextgov.com/cybersecurity/2015/03/pentagon-has-until-2016-extend-3000-jobs-offers-civilian-cyber-whizzes/106842/The military has been given the go-ahead to fast-track the hiring of 3,000 computer whiz civilians.Aliya SternsteinThu, 05 Mar 2015 17:12:24 -0500http://www.nextgov.com/cybersecurity/2015/03/pentagon-has-until-2016-extend-3000-jobs-offers-civilian-cyber-whizzes/106842/CybersecurityThree military cyber professionals conduct an exercise during Cyber Flag 13-1, Nov. 8, 2012, at Nellis Air Force Base, Nev. US Air ForcePentagon Adds Social Media Whiz to Teamhttp://www.nextgov.com/defense/2015/03/department-defense-adds-social-media-whiz-its-team/106827/The new director for digital media and strategy will revamp DOD's communication via social media.Hallie GoldenThu, 05 Mar 2015 16:46:32 -0500http://www.nextgov.com/defense/2015/03/department-defense-adds-social-media-whiz-its-team/106827/DefenseDefense Secretary Ash CarterManuel Balce Ceneta/AP4 Things to Know about the Federal IT Budget Proposalhttp://www.nextgov.com/cio-briefing/2015/03/4-things-know-about-federal-it-budget-proposal/106812/Big-ticket IT procurements and system modernizations provide a road map of agencies’ spending priorities in the year ahead.Jack MooreThu, 05 Mar 2015 15:56:03 -0500http://www.nextgov.com/cio-briefing/2015/03/4-things-know-about-federal-it-budget-proposal/106812/CIO BriefingCienpies Design/Shutterstock.comGAO: CMS Isn't Doing Enough to Address HealthCare.gov Failureshttp://www.nextgov.com/health/health-it/2015/03/gao-cms-not-doing-enough-address-healthcaregov-failures/106782/After the botched Healthcare.gov rollout, the Centers for Medicare & Medicaid Services haven't adequately improved itsIT processes, a recent report found.Mohana RavindranathThu, 05 Mar 2015 13:29:52 -0500http://www.nextgov.com/health/health-it/2015/03/gao-cms-not-doing-enough-address-healthcaregov-failures/106782/Health - Health ITGil C/Shutterstock.comSorry Consumers, Companies Have Little Incentive to Invest in Better Cybersecurityhttp://www.nextgov.com/cybersecurity/2015/03/sorry-consumers-companies-have-little-incentive-invest-better-cybersecurity/106785/The actual expenses from the recent and high-profile breaches at Sony, Target and Home Depot amount to less than 1% of each company’s annual revenues.Benjamin Dean, QuartzThu, 05 Mar 2015 13:29:27 -0500http://www.nextgov.com/cybersecurity/2015/03/sorry-consumers-companies-have-little-incentive-invest-better-cybersecurity/106785/CybersecurityHermin/Shutterstock.comHow New US Net Neutrality Rules Are Shaping the Internet Worldwidehttp://www.nextgov.com/cio-briefing/2015/03/how-new-us-net-neutrality-rules-are-shaping-internet-worldwide/106788/Supporters see FCC's decision as the first open-Internet domino, but critics are warning of darker possibilities.Kaveh Waddell, National JournalThu, 05 Mar 2015 12:58:30 -0500http://www.nextgov.com/cio-briefing/2015/03/how-new-us-net-neutrality-rules-are-shaping-internet-worldwide/106788/CIO Briefingpeterfactors/Shutterstock.comDoes the Focus on Snowden Undermine Surveillance Reform Discussions?http://www.nextgov.com/emerging-tech/emerging-tech-blog/2015/03/does-focus-snowden-undermine-surveillance-reform-discussions/106770/Exaggerated headlines and narratives overshadow the importance of the Snowden leaks in understanding U.S. government surveillance.Frank KonkelThu, 05 Mar 2015 10:33:31 -0500http://www.nextgov.com/emerging-tech/emerging-tech-blog/2015/03/does-focus-snowden-undermine-surveillance-reform-discussions/106770/Emerging Tech - Emerging TechFormer U.S. National Security Agency contractor Edward Snowden, who is in Moscow, is seen on a giant screen during a live video conference for an interview with Amnesty International.Charles Platiau/APFallout from Clinton’s Private Emails: How Secure are Agency Email Systems?http://www.nextgov.com/cybersecurity/2015/03/how-easy-it-dox-official-secretary-state/106746/Official government email accounts are no locked fortresses, and some shirk key federal security regulations.Aliya SternsteinThu, 05 Mar 2015 09:08:38 -0500http://www.nextgov.com/cybersecurity/2015/03/how-easy-it-dox-official-secretary-state/106746/CybersecurityBebeto Matthews/AP File PhotoHouse Committee Prods Energy Department to Use More Supercomputershttp://www.nextgov.com/emerging-tech/2015/03/house-science-committee-approves-supercomputing-bill/106698/The House Committee on Science, Space and Technology approved a bill that would require the Energy Department to invest in supercomputing research.Mohana RavindranathWed, 04 Mar 2015 17:10:24 -0500http://www.nextgov.com/emerging-tech/2015/03/house-science-committee-approves-supercomputing-bill/106698/Emerging TechThe Energy Department's Jaguar SupercomputerOak Ridge National LaboratoryVideo: Open Data and a More Effective, More Efficient Governmenthttp://www.nextgov.com/big-data/2015/03/video-open-data-and-more-effective-more-efficient-government/106695/The fourth installment in our collaboration with Socrata's Open Data TV.Caitlin FairchildWed, 04 Mar 2015 17:07:01 -0500http://www.nextgov.com/big-data/2015/03/video-open-data-and-more-effective-more-efficient-government/106695/Big Dataphipatbig/Shutterstock.comCommerce Department Launches Private Sector Data Brain Trusthttp://www.nextgov.com/cio-briefing/2015/03/commerce-department-data-advisory-council-be-filled-private-sector-experts/106716/The members of the newly created Data Advisory Council stem from some of the private sector’s leading tech companies.Hallie GoldenWed, 04 Mar 2015 16:36:18 -0500http://www.nextgov.com/cio-briefing/2015/03/commerce-department-data-advisory-council-be-filled-private-sector-experts/106716/CIO BriefingCommerce Secretary Penny PritzkerJ. Scott Applewhite/APSome Smartphone Apps Have to Be Cleared by the FDAhttp://www.nextgov.com/mobile/2015/03/some-smartphone-apps-have-be-cleared-fda/106719/Apps with a medical purpose need some approvalDr. Corinna Lathan, QuartzWed, 04 Mar 2015 16:10:10 -0500http://www.nextgov.com/mobile/2015/03/some-smartphone-apps-have-be-cleared-fda/106719/Mobilebloomua/Shutterstock.comYou Don’t Have to Know How to Code to Make it Big in Techhttp://www.nextgov.com/cio-briefing/wired-workplace/2015/03/you-dont-have-know-how-code-make-it-big-tech/106704/There are some characteristics of the tech world that have nothing to do with coding or technical preparation — and everything to do with attitude, emotional intelligence and flexibility.Karen Wickre, QuartzWed, 04 Mar 2015 15:54:03 -0500http://www.nextgov.com/cio-briefing/wired-workplace/2015/03/you-dont-have-know-how-code-make-it-big-tech/106704/CIO Briefing - Wired WorkplaceMark Lennihan/APFISMA by the Numbers: The Biggest Cyber Threats at These 5 Agencieshttp://www.nextgov.com/cybersecurity/2015/03/fisma-numbers/106689/Cybersecurity incidents targeting federal agencies are on the rise.Caitlin Fairchild and Jack MooreWed, 04 Mar 2015 14:54:05 -0500http://www.nextgov.com/cybersecurity/2015/03/fisma-numbers/106689/CybersecurityJeff Wasserman/Shutterstock.comTime is Running Out to Reform NSA Mass Surveillancehttp://www.nextgov.com/defense/2015/03/time-running-out-reform-nsa-mass-surveillance/106686/Nearly two years after Edward Snowden’s explosive revelations, surveillance reform remains in doubt as the window of opportunity closes.Dustin Volz, National JournalWed, 04 Mar 2015 13:41:52 -0500http://www.nextgov.com/defense/2015/03/time-running-out-reform-nsa-mass-surveillance/106686/DefenseJose Luis Magana/APMore Security Fears Surround Clinton’s 'Homebrew' Email Serverhttp://www.nextgov.com/cybersecurity/2015/03/more-security-fears-surround-clintons-homebrew-email-server/106677/“Clinton's decision to forgo the State Department's servers is inexplicable and inexcusable,” says one security expert.Dustin Volz, National JournalWed, 04 Mar 2015 13:31:05 -0500http://www.nextgov.com/cybersecurity/2015/03/more-security-fears-surround-clintons-homebrew-email-server/106677/CybersecurityFormer Secretary of State Hillary ClintonCarolyn Kaster/APSenate Offices Want New System to Track Website Vulnerabilities http://www.nextgov.com/cybersecurity/2015/03/senate-offices-getting-new-system-track-vulnerabilities-their-websites/106674/The Senate wants commercial, off-the-shelf software to scan, identify and help resolve vulnerabilities across 140 different Senate office websites.Jack MooreWed, 04 Mar 2015 13:22:44 -0500http://www.nextgov.com/cybersecurity/2015/03/senate-offices-getting-new-system-track-vulnerabilities-their-websites/106674/CybersecurityBrandon Bourdages/Shutterstock.com