Energy Sector Cybersecurity Called the Backbone of All Critical Infrastructure The interconnectedness of the energy sector presents both increased challenges and potential, according to panelists at an Institute for Critical Infrastructure Technology briefing. “The energy sector is clearly the backbone of all 16 critical infrastructures,” said Jay Williams, an ICIT fellow and vice president of cyber […] […]

Fed Cloud Silver Lining

We don’t need a crystal ball to know the future is bright for Federal cloud.  While agencies are starting to embrace cloud – today, 85% of Federal cloud decision-makers are more optimistic about what cloud can do for their agency than they were five years ago – think we can all agree the Federal IT […] […]

The Pentagon’s latest buzz phrase is Identity Activities, which means the Pentagon wants to employ data analysis tools that will leverage biographical, biological, behavioral, and reputational data inputs to help the military determine the identity of a person they encounter on the battlefield and whether that person poses a threat.






[…]

Agencies are moving users to the cloud, but how can they streamline the process? How can it be simplified to create an enhanced user experience?

“What activities, what data, and what threat are they bringing into the cloud?” These three questions are identified as primary concepts agencies should use to assess and prevent cloud application use as necessary, then implement policies based on the answers.






[…]

Data Center Closures and Cloud Key to Pentagons Future IT Environment If the Department of Defense were a private corporation, it would sit at the top of the Fortune 100, a behemoth with more than 2 million employees spread across 5,000 locations and a $36 billion annual IT budget. But it would still be wrestling […] […]

Use of Secure Sockets Layer (SSL)/Transport Layer Security (TLS) encryption is estimated at 15-25 percent of all network traffic, and growing at 20 percent annually. But by 2017, Gartner predicts “more than 50 percent of network attacks will use SSL/TLS.”

Agencies need to inspect encrypted traffic to ensure hackers are not hiding in SSL traffic.






[…]

The TSA last week discovered in a carry-on bag a loaded gun that was constructed of parts made with a 3-D printer….The Veterans Administration is actively pondering what it will require to manage transitioning from its legacy electronic health record, known as VistA, to a commercial EHR….And who’s keeping track of that teleworking equipment at the U.S. Patent and Trademark office?






[…]

MeriTalk and GSA are working together to connect the new Technology Transformation (TTS) leadership with industry and government to enhance collaboration on key issues – FedRAMP and 18F.  We want your feedback. We will hold an interactive session September 13th at the Newseum in Washington D.C. where David Shive, the new Commissioner for GSA’s TTS, […] […]

MeriTalk and GSA are working together to connect the new Technology Transformation (TTS) leadership with industry and government to enhance collaboration on key issues – FedRAMP and 18F.  We want your feedback. We will hold an interactive breakfast session September 13th at the Newseum in Washington D.C. where David Shive, the new Commissioner for GSA’s TTS, and […] […]

Bank regulations focusing on “too big to fail” have ignited a flurry of mergers and acquisitions in the financial industry, which in turn has created a legacy system vulnerability problem that may be responsible for the majority of data breaches reported to date….And over at DoD, as defense contract obligations reached record highs in 2008, the size of the acquisition workforce in the Defense Department actually shrunk.






[…]