Cloud

While the Federal government certifies cloud vendors as secure through the General Services Administration’s (GSA) Federal Risk and Authorization Management Program (FedRAMP), an official at the Government Accountability Organization (GAO) shared striking statistics about agencies going outside of the program for cloud vendors, which can lead to vulnerabilities. […]

President Biden

President Biden said today that he spent “a great deal of time” discussing cybersecurity issues with Russian President Vladimir Putin at their three-hour summit meeting held June 16, and central to that discussion was President Biden’s assertion that critical infrastructure should be off limits to any attacks. […]

Emerging tech

Legislation introduced by members of the House Committee on Science, Space, and Technology would require the White House’s Office of Science and Technology Policy (OSTP) and the National Science and Technology Council (NSTC) to establish a national science and technology strategy. […]

broadband

The road to Federal agencies implementing zero trust security architecture – one of the overriding goals of President Biden’s cybersecurity executive order – leads unavoidably through completion of the transition to a network infrastructure that relies on all-IPv6 (Internet Protocol version 6) address protocols, Federal IT officials emphasized today. […]

telework, workplace
DHS

The Department of Homeland Security’s (DHS) Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO) organization is looking to upgrade its IT architecture by consolidating its IT systems into a single architecture on the ServiceNow platform. […]

The Senate Homeland Security and Governmental Affairs Committee today approved by voice vote the Biden administration’s nominees to lead the General Services Administration (GSA), the Cybersecurity and Infrastructure Security Agency (CISA), and to take the role of National Cyber Director. […]

Pipeline

The Transportation Security Agency (TSA) is in the process of developing another cybersecurity directive for critical infrastructure pipeline owners and operators, following the initial directive it issued to them following the Colonial Pipeline ransomware attack. […]

Cybersecurity

Federal Chief Data Officers (CDO) examined the processes, technologies, and strategies that should be in place to help agencies not just manage data but master and leverage it as a strategic asset, during AFCEA Bethesda’s Breakfast Webinar series on June 15. […]

Army

The U.S. Army’s Chief of Staff Gen. James McConville and Secretary of the Army Christine Wormuth testified in front of Senate Armed Services Committee today and said the Army is due for a large-scale modernization effort, but emphasized there are still unfunded modernization requirements that were not met with the Army’s FY2022 budget request. […]

funding

Rep. Yvette Clarke, D-N.Y., chair of the House Homeland Security Committee’s Cybersecurity Subcommittee, said today she hopes Congress will provide further funding for IT modernization and cybersecurity improvements to build on the recent $1 billion infusion into the Technology Modernization Fund (TMF), and the extra $650 million provided to the Cybersecurity and Infrastructure Security Agency (CISA) in the American Rescue Plan Act. […]

Sens. Rob Portman, R-Ohio, Patty Murray, D-Wash., and Angus King, I-Maine, introduced a bipartisan bill that aims to close the digital divide and promote “digital equity” utilizing $250 million in annual grants, according to a press release. […]

cloud

The Department of Defense’s (DoD) Office of the DoD Chief Information Officer has released its Outside the Continental United States (OCONUS) Cloud Strategy, which strives to enable an all-domain advantage for international operations through cloud innovation. […]

cloud

The Defense Information Systems Agency (DISA) is employing the Defense Enterprise Office Solution (DEOS) – an enterprise commercial cloud service supporting the Defense Department (DoD) enterprise – to implement the DoD 365 Joint (DoD365-J) Tenant project, officials said today. […]

As government agencies shape their goals and priorities for the new administration, they continue to target waste, fraud, and abuse. Rob Owens, deputy inspector general for Management and Policy at the U.S. Department of Health and Human Services (HHS), explained this week how HHS is targeting waste, fraud, and abuse by utilizing geospatial analytics and visualization as part of a Geographic Information System (GIS). […]

FBI
DISA
cybersecurity

The SolarWinds software supply chain hack – disclosed in December 2020 – represented a new scale of nation-state cyber aggression, with thousands of organizations compromised, including at least nine Federal agencies. And just last month, the Colonial Pipeline ransomware attack further highlighted the national security risks created by cyber aggression. […]

cybersecurity

The Social Security Administration (SSA) has implemented four of the seven open priority recommendations that the Government Accountability Office (GAO) identified in April 2020, including updating systems and establishing a risk management framework. […]

Carlos Del Toro, President Biden’s nominee to become Secretary of the Navy, is set to bring to the service branch an extensive technology profile from 17 years as CEO of SBG Technology Solutions, which provides IT modernization, governance, cybersecurity, and AI tech to the Federal government. […]

General Services Administration GSA

The General Services Administration (GSA) is in search of a vendor to help manage its electronic leasing tool, known as GSA Real Estate Exchange (G-REX), and provide IT services to support the application’s maintenance and updates. […]

cybersecurity

Sens. Gary Peters, D-Mich., and Rob Portman, R-Ohio, are looking to get input from the White House as they work to draft legislation that would deal with the ongoing rise of ransomware attacks, the Senate Committee on Homeland Security and Governmental Affairs announced June 11. […]

Cyber

Cyberthreats are constantly evolving. There are new attackers, new vulnerabilities, and new security risks that are arising every day. Threat hackers have rapidly increased their sophistication and techniques that make them harder to spot and threaten even the savviest targets. Criminal groups are also targeting businesses that have moved their infrastructure to the cloud. This way, they can hide among legitimate services. Attackers have developed new ways to scour the internet for systems vulnerable to ransomware. […]

NASA
Pentagon Military Defense DoD

The Department of Defense (DoD) has made progress in improving software and cybersecurity associated with its weapons systems, but the programs still struggle to implement and execute modern software development practices, according to a recent Government Accountability Office (GAO) report. […]

Categories