So, you heard it here first–GSA does indeed have its underpants full of alligators. This week’s IG report on GSA’s 18F $31 million flutter makes the $800,000 Las Vegas boondoggle look like a pocket-change indiscretion. And, we understand the IG’s not finished yet–not one, but two more IG reports on the way in November and December.






[…]

After the OPM breach in 2015, what has the government learned? What would be done differently with today’s technology?

During a Federal News Radio interview, Aubrey Merchant-Dest, Federal CTO, Blue Coat, pointed to guidance from the National Institute of Standards and Technology (NIST) and the Department of Homeland Security (DHS) as ways for agencies to prevent another breach






[…]

You may have heard the phrase “this is a marathon, not a sprint” used when discussing important programs launched by organizations. That might be the case with some business initiatives, but it doesn’t necessarily apply to Federal IT, says Jason Kimrey at Intel.






[…]

The 2016 Executive Leadership Conference (ELC) will gather #ChangeAgents for training and education and showcase examples of #ChangeAgents who are already making a difference today. We need to provide “safe spaces” to experiment on doing public service differently and better, says FCC CIO David Bray.






[…]

One veteran Federal analyst tells The Situation Report that the “average” presidential transition ushers in 5,000 new appointments, 1,000 of which require Senate confirmation. But the upcoming transition promises to be a unique experience, regardless of who gets elected.






[…]

Often we’re so focused on locking down data access that we lose sight of whether our business can continue when data is lost, stolen, or compromised. Instead of asking if your network is secure, step back and ask yourself, “Is my network resilient?”






[…]

As Cloud Computing matures as an engine of cost savings, improved agility, and enhanced security, options have grown beyond the “one-size-fits-all” offerings available to early users. Organizations can choose between a mix of on-premises or off-premises clouds, or implementing hybrid architectures that combine the best features of all these choices into a tailored solution that meets their own unique needs. When […] […]

News broke this week that the FBI in August had arrested another NSA employee for allegedly stealing and hoarding highly classified information in his home and car. Like Edward Snowden, the employee worked for Federal contractor Booz Allen Hamilton, raising questions about the efficacy of the security reforms put in place at the agency.






[…]

Word on the street is that two new IG reports on GSA 18F/TTS will see the light of day in October. We understand that the reports were supposed to hit the street this summer–but that the IG keeps finding new issues and interviewing more folks at GSA and across the government. So, do the delays mean there’s more than smoke?






[…]

Agencies continue to migrate to the cloud, but require a strong security service to protect their systems. A Cloud Access Security Broker (CASB) addresses security concerns and provides a go-between for end users and applications






[…]

Word is that www.fedramp.gov–and even the new, shiny FedRAMP dashboard–are running in a cloud without a FedRAMP ATO. Now, that’s embarrassing.






[…]