Cybersecurity

At Least One State Declines Offer for DHS Voting Security

Some security experts say it wouldn't even take the resources of a foreign nation to manipulate actual votes using this country's antiquated tallying systems.

Cybersecurity

Hackers Take Over Ukraine Government Social Media

Government (Foreign) // Social Media // Ukraine

Cybersecurity

Officials: Yearly budgeting stifles cybersecurity

Current and former officials argue that a one-year budgeting cycle impedes government cybersecurity and IT modernization.

Modernization

NPPD still hopeful on infrastructure protection

After a year, DHS remains optimistic that a proposed reorganization to link cyber and physical security operations will move forward.

Cybersecurity

OPM hire means top detailees go back to their real jobs

The two top-level IT officials who were detailed to positions outside their agencies while OPM was between full-time CIOs will return to their regularly scheduled programming.

Digital Government

18F offers specs on gov-wide login

In a public notice, the innovation group 18F offered a glimpse into the data a planned governmentwide login site would collect.

Acquisition

GWACs ride the tide of popularity

Big governmentwide contracts are seeing increased buying compared to last year.

Emerging Tech

Why Agile is Still So Hard for the Government

Pockets of the federal government want to change the buying process so technology can be acquired in sprints, preventing large-scale failures like the HealthCare.gov rollout.

Modernization

The Internet of (Poorly Working) Things

So, how is it that we don’t have connected objects that just work?

Cybersecurity

What Vendors Need to Know About GSA’s New Cyber Offerings

Companies that want to provide services for the new SINs will need to explain their way through a variety of scenarios.

Digital Government

Pentagon’s Contract-Spending Problem

Of $205 billion awarded in contract spending across DOD, only $101 billion was competed.

Cybersecurity

DHS: Don't Fall for Louisiana Flood Charity Scams

The U.S. Computer Emergency Readiness Team warned against donating to fake organizations.

Cybersecurity

Marine cyber chief: Do not fear RMF

Ray Letteer, chief of the Marine Corps' Cybersecurity Division, advocates faster adoption of the government's Risk Management Framework.

Modernization

Why privilege can be risky

Privileged users, according to a new three-year study sponsored by Forcepoint and performed by the Ponemon Institute, are still a weak point for network security in federal networks.

People

POTUS social media to reset with new administration

President Obama's Facebook, Twitter and Instagram posts will follow the exiting leader out of the Oval Office, leaving a blank slate for his successor.