Results 3101-3110 of 7224
Virginia Sen. Mark Warner on Capitol Hill in March.

Warner Pushes for DATA Act Follow-Through

Former governor and tech executive says he’s pleased with agency progress on implementation.

Tattoo Algorithms Could Soon Help Identify Criminals

A newer system might use image recognition, instead of verbal descriptions of tattoo designs, to identify individuals or find patterns.

Former DHS CIO Rirchard Spires

Oversight ‘Urgently Needed’ as Agencies Implement IT Reform Law, Watchdog Says

The former DHS CIO will tell Congress some agencies will likely struggle to fully implement the Federal IT Acquisition Reform Act, known as FITARA.

OPM Hack: Why Email Notification Makes a Bad Situation Even Worse

By using a third party to manage data breach communication, OPM has now, in essence, provided phishers with a blueprint for creating an attack.

McConnell to Pair Cybersecurity Rules With Defense Bill

Privacy advocates still fear the information-sharing bill could lead to more NSA spying.

EPA CIO Wants her Tech Team to Take Smart Risks

Though she left private industry six years ago, Ann Dunkin is still evangelizing agile practices -- and encouraging her staff to take risks.

It's Costing OPM $20 Million to Contact Hacked Feds

OPM issued a solicitation to identity theft protection companies a week before disclosing a hack that exposed private information on millions of current and former federal employees.

Fitness trackers, from left, Basis Peak, Adidas Fit Smart, Fitbit Charge, Sony SmartBand, and Jawbone Move, are posed for a photo next to an iPhone.

The Promise of Wearables in Law Enforcement

A wrist-worn device could tip off a dispatcher if a law enforcement official appears to be in danger.

Syrian Electronic Army Claims Hack of Army Website Monday

The Army’s official website was inaccessible for part of the day.

White House Orders All Federal Sites Go HTTPS By the End of 2016

Today, most of the federal government's roughly 1,200 websites use HTTP technology, which exposes website content, browser format, search terms and other user information to eavesdroppers.