Cybersecurity

What to look for in cyber policy during Trump's first 100 days

As the new administration comes on board, leaders must understand the cybersecurity relationships protecting critical infrastructure, according to one expert.

Cybersecurity

Army announces bug bounty program

Based on the "Hack the Pentagon" bug bounty program, the Army's effort will let military personnel and government civilians find vulnerabilities in the Army's recruiting websites.

People

Donald Trump's management agenda?

Steve Kelman looks for clues (and raises concerns) about how the next administration might run.

Modernization

Report: FBI Can Unlock Most Devices

The bureau can access the data on most of the smartphones and laptops it encounters during investigations, according to a report.

Cybersecurity

NIST to Small Businesses: Protect Your Networks

Small businesses could provide hackers with an entry into larger ones.

Digital Government

Home Monitoring Will Soon Monitor You

When the internet of things begins to track electrical usage, houses could become more measured—and scrutinized—than ever.

Digital Government

The 2016 Rising Stars

FCW profiles 30 women and men who are doing great things in federal IT -- and who are poised to be the leaders of tomorrow.

Emerging Tech

Will Trump’s Victory Be Silicon Valley’s Wake-Up Call?

It’s long past time for tech companies to acknowledge that wielding enormous publishing power requires taking editorial responsibility.

People

IT, management advice for the new administration

FCW's columnists, contributors and reporters look at how the incoming Trump administration can tackle management, IT acquisition, cybersecurity and more.

Digital Government

OMB updates 12-year-old federal website policy

The Office of Management and Budget is looking for more functionality, security, privacy and oversight of agencies' public-facing websites.

Digital Government

IRS IT contracts could leak sensitive info, says watchdog

The IRS needs to implement more controls for IT contracts to meet federal requirements to protect agency systems and sensitive information.

Modernization

Is our IT infrastructure crumbling, too?

Moving to IP-based networks is the answer -- if the right tools are deployed to ensure security.

Cybersecurity

Why cyber needs to be front and center in the transition

Experts warn that past transitions have ignored the lessons learned by outgoing administrations, and the stakes are so high now that the Trump Administration needs to heed the advice of Obama's cyber officials.

Digital Government

Russia Has Started Bringing the World’s Tech Giants to Heel, and LinkedIn is First

A 2014 law was the warning shot: The Kremlin threatened to block any company that stored Russian citizens’ personal data on non-Russian servers.

People

Deanna Stephens

Web Technology Specialist, Federal Communications Commission

People

Brian J. Lawrence

Senior Manager of Advanced Technologies, Veracity Engineering