Results 3091-3100 of 7220
Sue Gordon, NGA’s deputy director

NGA Deputy Director: Let’s Get More Agile

If a specific strategy or procedure is in NGA’s best interest and not outright prohibited, the agency's contracting officers should assume it’s allowed

University of Tokyo robot Aero DRC competes in he first stage of the U.S. Defense Advanced Research Projects Agency Robotics Challenge in Pomona, Calif.

DARPA Wraps Up Robotics Challenge But Don’t Expect C-3PO Any Time Soon

The Pentagon's research agency was looking for robots that could eventually help in humanitarian crises.

Why Credit Monitoring Fails to Address the Real Threat Facing Hacked Feds

State-sponsored breach was probably never about financial information, experts say.

House Oversight Committee member Rep. Gerald Connolly, D-Va.

Agencies Get IT Reform Marching Orders, but Don't Expect Congress To Sit Idle

The Office of Management and Budget is holding agencies’ feet to the fire to fully implement the new CIO job responsibilities.

OPM Hacking Deals Yet Another Blow to Federal Morale

Employees are upset at the way OPM handled the breach, but private sector cybersecurity is not much better, contractors note.

The Price of Reading Hillary Clinton's Emails

Twelve State Department employees are working full-time to vet thousands of messages, but that's just part of a process that could cost more than $1 million.

Virginia Sen. Mark Warner on Capitol Hill in March.

Warner Pushes for DATA Act Follow-Through

Former governor and tech executive says he’s pleased with agency progress on implementation.

Tattoo Algorithms Could Soon Help Identify Criminals

A newer system might use image recognition, instead of verbal descriptions of tattoo designs, to identify individuals or find patterns.

Former DHS CIO Rirchard Spires

Oversight ‘Urgently Needed’ as Agencies Implement IT Reform Law, Watchdog Says

The former DHS CIO will tell Congress some agencies will likely struggle to fully implement the Federal IT Acquisition Reform Act, known as FITARA.

OPM Hack: Why Email Notification Makes a Bad Situation Even Worse

By using a third party to manage data breach communication, OPM has now, in essence, provided phishers with a blueprint for creating an attack.