Cybersecurity
At Least One State Declines Offer for DHS Voting Security
Some security experts say it wouldn't even take the resources of a foreign nation to manipulate actual votes using this country's antiquated tallying systems.
Cybersecurity
Hackers Take Over Ukraine Government Social Media
Government (Foreign) // Social Media // Ukraine
Cybersecurity
Officials: Yearly budgeting stifles cybersecurity
Current and former officials argue that a one-year budgeting cycle impedes government cybersecurity and IT modernization.
Modernization
NPPD still hopeful on infrastructure protection
After a year, DHS remains optimistic that a proposed reorganization to link cyber and physical security operations will move forward.
Cybersecurity
OPM hire means top detailees go back to their real jobs
The two top-level IT officials who were detailed to positions outside their agencies while OPM was between full-time CIOs will return to their regularly scheduled programming.
Digital Government
18F offers specs on gov-wide login
In a public notice, the innovation group 18F offered a glimpse into the data a planned governmentwide login site would collect.
Cybersecurity
5 Ways Agencies Can Prepare for Cyberattacks
Agencies are under great pressure to protect personal data.
Acquisition
GWACs ride the tide of popularity
Big governmentwide contracts are seeing increased buying compared to last year.
Cybersecurity
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Emerging Tech
Why Agile is Still So Hard for the Government
Pockets of the federal government want to change the buying process so technology can be acquired in sprints, preventing large-scale failures like the HealthCare.gov rollout.
Artificial Intelligence
Artificial Intelligence, Tech and Tequila: Come Hang with Us
Learn how the government plans to deal with artificial intelligence.
Digital Government
Video: This Serious Note-Taking App Can Help You Write it All Down
Taking notes made easy.
Modernization
The Internet of (Poorly Working) Things
So, how is it that we don’t have connected objects that just work?
Cybersecurity
What Vendors Need to Know About GSA’s New Cyber Offerings
Companies that want to provide services for the new SINs will need to explain their way through a variety of scenarios.
Modernization
We’ll Talk to Our Phones in the Future Because Our Fingers Are Puny and Slow
Speech recognition can finally keep up with the rate of speech.
Digital Government
Pentagon’s Contract-Spending Problem
Of $205 billion awarded in contract spending across DOD, only $101 billion was competed.
Cybersecurity
DHS: Don't Fall for Louisiana Flood Charity Scams
The U.S. Computer Emergency Readiness Team warned against donating to fake organizations.
Cybersecurity
Marine cyber chief: Do not fear RMF
Ray Letteer, chief of the Marine Corps' Cybersecurity Division, advocates faster adoption of the government's Risk Management Framework.
Modernization
Why privilege can be risky
Privileged users, according to a new three-year study sponsored by Forcepoint and performed by the Ponemon Institute, are still a weak point for network security in federal networks.
People