Cybersecurity
supply chain risk management process automation

Federal cyber leaders and government agencies are pushing forward with Supply Chain Risk Management (SCRM) and Cybersecurity Supply Chain Risk Management (C-SCRM) initiatives to address vulnerabilities and prevent further incidents from compromising critical systems. […]

three-keys-to-cybersecurity

Government agencies continue to modernize IT environments putting data to work for employees, citizens, and the warfighter. During a webinar hosted by Dell Technologies on Oct 19, Federal chief intelligence officers (CIOs) shared best practices for selecting the right infrastructure for high-value workloads.

  […]

Federal money spending government
AI
CISA

The Senate Appropriations Committee released nine appropriations bills for fiscal year (FY) 2022 on October 18 including a Homeland Security funding bill that would give the Cybersecurity and Infrastructure Security Agency (CISA) a 30 percent budget increase over FY2021 levels, to $2.638 billion. […]

Innovation

Rep. Adam Smith, D-Wash., chairman of the House Armed Services Committee, said today that the Pentagon, as well as the rest of the Federal government, needs to adopt a problem-solving mindset in order to succeed in innovation in a rapidly changing technological landscape. […]

CISA

Agency (CISA) provides insight into what Federal buyers will be looking for in technology central to the Biden-Harris administration’s network visibility-focused cybersecurity executive order, specifically on network endpoint detection and response (EDR) capabilities. […]

FCC
TMF

The Senate Appropriations Committee’s proposed Fiscal Year 2022 Financial Services and General Government (FSGG) funding bill proposes no new funding for the Technology Modernization Fund (TMF), which at the moment is flush with cash and in the process of farming out $1 billion of funding approved under the American Rescue Plan Act to help Federal agencies modernize their IT systems and improve cybersecurity. […]

The emergence of adversarial artificial intelligence (AI) requires special attention. AI users need to understand the threat space and organize responsible AI mitigations, said Pamela Isom, director of the Artificial Intelligence and Technology Office (AITO) at the Department of Energy (DoE), on Oct. 18 at the AI World virtual summit. […]

Federal money spending government

Small Business Innovation Research (SBIR) and Small Business Technology Transfer (SBTT) programs awarded over $3 billion in contracts to small businesses in fiscal year (FY) 2020, but those awards were not been consistently issued in a timely fashion, the Government Accountability Office said in a new report. […]

DoD

The Defense Digital Service (DDS) is repurposing its automated background investigations prototype to focus on insider threats, which includes a name change from the System for Automated Background Evaluation and Review (SABER) to the System for Insider Threat Hindrance (SITH). […]

The Department of Defense’s (DoD) Defense Advanced Research Projects Agency (DARPA), the research and development arm of the DoD, is working on an artificial intelligence project that goes beyond the simple augmentation of work process and is focusing on the symbiosis of human and machine, according to a DARPA official. […]

AI

Artificial intelligence (AI) has wholly transformed the way employees are recruited, hired, trained, evaluated, and even fired. However, employers must find the right division of labor between AI and human resources personnel between using AI to improve human decision-making and delegating decision-making entirely to algorithms, said Keith Sonderling, commissioner for the U.S. Equal Employment Opportunity Commission (EEOC), on Oct 18 at the AI World virtual summit. […]

For many government agencies, Time Division Multiplexing (TDM) technology has formed the core of their networks for decades. Because many mission-critical operations run on TDM services, organizations often took an ‘If it ain’t broke, don’t fix it’ approach to TDM. Today, TDM technologies are at end of life – or beyond – and expertise in them is quickly dwindling. […]

ransomware
TMF

The General Services Administration’s (GSA) project for further development of its Login.gov authentication and identity proofing services won by far the largest share of funding from the Technology Modernization Fund’s (TMF) awards totaling $311 million announced late last month. […]

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory on Oct. 18 warning organizations that the BlackMatter ransomware group is targeting U.S. critical infrastructure entities. […]

Army

The United States Army wants to freely send data back and forth from its legacy enterprise systems to the tactical edge, and Army officials said the key to getting there is mapped out in the service branch’s recently released strategy to unify tactical and enterprise networks and ultimately create a common data fabric. […]

FEMA

In the new era of cyber defense, Ted Okada, chief technology officer (CTO) at the Federal Emergency Management Agency (FEMA), stressed that IT leaders must take the right risks to lead their teams in risk management efforts. […]

The Small Business Administration (SBA) Office of Inspector General (OIG) released its report on management and performance challenges for fiscal year (FY) 2022, which includes highlighting “significant” challenges in IT investment, system development, and security controls. […]

Democrats in both the House and Senate have introduced bills to fund a cybersecurity grant education program at Historically Black Colleges and Universities (HBCUs) and Minority Serving Institutions (MSIs).      […]

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released a joint cyber advisory Oct. 14 warning of an ongoing cyber threat to U.S. Water and Wastewater Systems (WWS) facilities and gave the WWS sector recommended mitigations. […]

NASA officials predict that the agency’s latest state-of-the-art satellites – launching soon – will generate an unprecedented amount of data that will be difficult to manage and optimize with NASA’s current software. Therefore, NASA researchers have turned to cloud computing to make the most of that treasure trove of information. […]

cybersecurity

Research from MeriTalk shows that 83 percent of government cybersecurity leaders say their organization operates on an “assume breach” model – assuming their networks have already been breached, or will be. However, cybersecurity experts stress that it’s equally important to put efforts into breach prevention, which involves crucial steps such as identifying all network assets. […]

Labor

Federal agency chief information officer (CIO) reporting lines – long a mainstay for critical review by the House Oversight and Reform Committee in its semi-annual FITARA Scorecard that rates Federal agencies on key IT effectiveness measures – are taking center stage in a new report from the Labor Department’s (DOL) Office of Inspector General (OIG). […]

Big Data Analytics
Army
federal workforce worker hired-min

Categories