Digital Government
HHS On the Lookout for a Deputy CIO
The deputy CIO will help coordinate the department's cloud strategy, among other responsibilities.
Ideas
4 Steps to Boost Records Management Practices
Federal employees and managers aren't confident about what actually constitutes a record.
Cybersecurity
Why Identity-Theft Protection Isn’t All It’s Cracked Up To Be
Victims of data breaches are still vulnerable even with identity theft protection.
Cybersecurity
Backfitting the Safety Act
Lawmakers and experts debate ways to provide liability protections for cyberattacks.
Cybersecurity
Watchdog: Water, Power on Pentagon Installations Need Better Protection Planning
Better planning could help DOD protect its utilities from cyberattack and unexpected storms, a GAO report said.
Cybersecurity
Census Wants Employees Prepared for Phishing Attacks
The training program is meant to make sure the bureau’s employees are armed with the appropriate knowledge and skill set to defend themselves against future attacks.
Cybersecurity
DOJ Refuses to Release Secret Cybersecurity Memo
Sen. Ron Wyden says the memo is crucial to the Senate's upcoming cybersecurity debate.
Emerging Tech
The Slow Death of Google Plus
The tech giant announced it will be slicing out its social network from the rest of its services.
Digital Government
Linking laws through open data
Open data holds the promise of connecting legislation in new ways, bringing federal, state and local laws together and automating compliance. But teaching machines to read law –- or lawmakers to read machines -- is no simple task.
Acquisition
DHS signs up for OASIS
GSA expects to do about $250 million worth of business a year with the Department of Homeland Security under the OASIS memorandum.
People
What exactly is enterprise risk management?
It's more than simply rolling up the traditional risk management efforts — and it's increasingly critical for agencies.
Digital Government
NSA to Purge Database of Phone Records Collected Under Mass Surveillance
“As soon as possible, NSA will destroy the Section 215 bulk telephony metadata upon expiration of its litigation preservation obligations.”
Cybersecurity
Navy Man Allegedly Staged Photo Shoot Inside Classified Nuke Sub
The machinist’s mate then hammered the evidence to smithereens and shot his laptop.
Emerging Tech
Video: How to Drive a Lunar Spacecraft
It's more difficult than mastering the stick shift.
Acquisition
NIST app competition, Clapper's hack warning, DIA protests and a new intel CIO
News and notes from around the federal IT community.
Emerging Tech
Obama Talks Federal IT on ‘Daily Show”
The commander in chief discussed the wave of Silicon Valley tech talent invading government, challenges in IT procurement and how better IT can lead to better federal customer service.
Emerging Tech
USDA Teams Up with Microsoft on Food Data Challenge
The newly launched Innovation Challenge aims to inspire the public to create tech tools for analyzing food supply data.
Emerging Tech
Here's What Its Like to Pilot a Giant Fighting Robot
MegaBots was founded by three engineers who didn’t want to use their skills to go work for another large tech firm in the valley.
People