Cybersecurity

Nuclear Security Summit addresses cyberthreats

President Obama used the global stage of the Nuclear Security Summit to discuss cooperation among more than 50 other countries in protecting nuclear facilities from cyberattacks.

Modernization

GSA retires legacy accounting IT

GSA decommissioned its old back-office financial system as its tiered IT modernization effort continues and shared services advance.

Modernization

Extending the life of legacy IT

When there’s no money to replace aging systems, cloud-based unified communications can offer agencies a critical bridge.

Modernization

Apple Turns 40

Forty years ago today, two college dropouts decided to start selling cobbled-together computers out of a garage in California because they couldn’t afford the ones on the market.

Emerging Tech

Next-Generation Weather Satellites Going Up in October. But What’s Coming Down?

The GOES-R constellation will replace the existing GOES fleet, which consists of a backup satellite and two active satellites that monitor the U.S. 24/7.

Digital Government

Are CIOs to Blame for the Legacy IT Crisis?

GAO research shows the average tenure for an agency CIO barely tops two years.

Emerging Tech

Scientists Figured Out How to Steal Any 3-D-Printed Product Just From the Sounds the Printer Makes

If your company uses 3-D printing for anything confidential or sensitive, it might be time to invest in some soundproofing.

Digital Government

Federal Community Mourns Bob Welch (1942-2016)

Co-workers say, above all else, their friendship with the mentor and visionary will be missed.

Digital Government

What the Pentagon’s Bug Bounty Program Won’t Fix

The defense secretary reveals a prize pool of $150,000, but will the program reveal the limits of Silicon Valley solutions to DOD problems?

Ideas

Turning Damage Control into Digital Modernization

Legacy IT modernization seems to be the right medicine, but one big question looms over the idea: Will that $3.1 billion be well spent?

Modernization

How Powerful Is the FBI’s Tool for Unlocking iPhones?

How the FBI proceeds in two other court cases, one in Arkansas and the other in Brooklyn, might lead to some answers.

Digital Government

State Department's database vulnerabilities are nothing new

The Consular Consolidated Database has endured IT glitches in the past, and a former U.S. official tells FCW that the system's architecture remains vulnerable to hacking.