TECH - ALL ARTICLES

Results 61-70 of 3817

The Public Participation Playbook Goes Live

After months of work by both the government and public, the new handbook is ready to help foster engagement.

Obama Administration Announces New Rules on NSA Spying

A new report from the intelligence community outlines post-Snowden changes to how the government spies on Americans and foreigners.

Obama Budget: How Far Does $14 Billion In Cyber Spending Go?

Among the government departments asking for more cyber resources are the Pentagon and the Department of Homeland Security.

President Barack Obama's new $4 trillion budget plan is distributed by Senate Budget Committee staffer Eric Chalmers as it arrives on Capitol Hill in Washington, early Monday, Feb. 2, 2015.

Agencies to Get In-House Digital Teams and 4 Other Proposals in Obama’s IT Budget Blueprint

The digital squads will focus on revamping agencies’ online citizen-facing services.

Pro-Russian rebel fighter guard an area of the Malaysia Airlines Flight 17 plane crash in the village of Hrabove, Donetsk region, eastern Ukraine.

US Visitor Surveillance System Brings Some Solace to Families of MH17 Victims

A database that houses the fingerprints of almost all foreign visitors to catch terrorists recently was used for a different purpose -- bringing closure to bereft families.

House Committee Demands Answers from CTO Megan Smith and HHS on HealthCare.gov Data Mining

The head of the House Space, Science and Technology Committee says he might call U.S. Chief Technology Officer Megan Smith to testify about potential HealthCare.gov consumer privacy gaps.

Government Privacy Board Tells Obama: Shut Down NSA Mass Spying Now

The White House has been quiet on surveillance reform since the USA Freedom Act crumbled in the Senate last November.

The Pentagon Accelerates Move to Cloud Computing

The proof is in the participation: The Defense Department’s latest cloud security guidelines received 800-plus public comments, the vast majority of them from industry players and cloud providers.

Beware the Unwitting Insider Threat

Employees who click on dubious email attachments, plug in unsecured storage devices or leave laptops unsecured, among other problematic IT practices, may be the biggest threat posed to securing federal agency networks.