Modernization

Reminder: Mobile Payments Are More Secure Than Traditional Credit Cards

That strip of plastic is riskier than you think.

Cybersecurity

NGA sees urgency in harnessing commercial geoint capabilities

At a Nov. 16 small satellite workshop at NGA headquarters, Director Robert Cardillo said his agency must hitch itself to the explosion in commercial geospatial capabilities.

Cybersecurity

Marine Corps CIO seeks to cordon off network

The uniqueness of the Marine Corps network and the threat of adversaries manipulating data require the Corps to segment parts of its network to make it more defensible, CIO Dennis Crall said.

Cybersecurity

Governance lags tech on info sharing, CIA's Brennan says

The CIA director warns that the rapid technological improvements in spycraft and information collection have outpaced the ability of worldwide intel agencies to cooperate.

Digital Government

Clinton Says US Should Spend Whatever It Takes to Scrutinize Incoming Syrian Refugees

Screening "is the No. 1 requirement” for Syrians seeking to enter the United States, Clinton said during the debate.

Emerging Tech

Video: Is This High-Tech Barbie Watching You?

As more toys connect to the Internet, security concerns rise.

Cybersecurity

Credentials of Spotify Users Surface Online

Entertainment // Web Services

Cybersecurity

70 Million U.S. Prisoner Calls Breached

Telecommunications // United States

Cybersecurity

New Hatch Act rules affect feds on social media, DOT faces cyber audit and more

News and notes from around the federal IT community.

Cybersecurity

Time for agencies to tell OMB about high-value assets

The federal CIO pushed hard deadlines in his Cybersecurity Strategy and Implementation Plan. To meet the first, agencies had to grapple with the question: 'What’s a high-value asset?'

Cybersecurity

What does Tor's allegation against the FBI mean for computer research?

The Web anonymity service's allegation that the FBI paid researchers to unmask Tor users has alarmed some cryptographers and raises questions about the collaborative relationship between law enforcement and security researchers.

Cybersecurity

So many chiefs, so little coordination

The growing number of roles with "chief" in the title are complicating governance and security efforts, especially when they bypass the CIO.

Cybersecurity

Why shadow BYOD is your next big problem

Mobile might not be the most serious security risk, but it needs far more attention than it has been getting.

Cybersecurity

Cyber ‘War Games’ against China, Iran and North Korea Set for 2016

The drills are expected to run uniformed service members, civilians and contractors through the motions of staving off a cyber assault.

Cybersecurity

OPM’s $20 Million Contract for Post-Hack ID Protection Violated Federal Contracting Rules

Investigators found “significant deficiencies” in the process of awarding of the contract to Winvale Group and its subcontractor CSID, according to OPM IG Patrick McFarland.

Modernization

Where Americans Can Be Tracked Without a Warrant

Can cops look at cellphone-location records without a warrant? It depends where you live.

Cybersecurity

Pentagon purges HTML from .mil emails

The Pentagon is tightening the screws on its campaign to improve email security. Get ready for a return to plain text.