State-Federal collaboration is going to be essential in combating state and local cyber threats, according to witnesses at a cybersecurity congressional hearing. “States have constantly ranked their cyber capabilities among the lowest capabilities,” said Rep. Dan Donovan, R-N.Y. “What is preventing us from reaching an appropriate level of cybersecurity?” […]
On average, students lose two months of academic achievement over the summer. To prevent any learning loss, it’s key to keep students’ minds engaged with educational and fun applications. Here are the top teacher recommended apps to set up students for success in the next school year.[…]
For the first time, the Centers for Medicare & Medicaid Services (CMS) has released the Medicare standardized payment amount, which makes Medicare payments across all geographic areas comparable.
The information was part of the third annual release of the Physician and Other Supplier Utilization and Payment public use data.
The increasing sophistication of cyberattacks and the emerging threat of ransomware are placing a new premium not only on high-level technical skills but on bold, effective leadership. “Each day, the cyber threat landscape changes, and our attackers are unrelenting,” said Rob Potter, vice president of the Americas for Symantec.[…]
Congress has passed an appropriations bill to fund increased medical care for military veterans–particularly women–a burgeoning contingent of the vet population. The bill contains language that presses the VA to improve health care for female veterans by considering the launch of a mobile health care pilot program.[…]
MeriTalk is running a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT. […][…]
Less than three months after a wave of negative feedback from industry forced the General Services Administration to revamp the Federal Risk and Authorization Management Program, a new MeriTalk survey shows for the first time that many government IT officials doubt the value of the program in its current form.[…]
MeriTalk begins a series taken from a book-length work authored by a senior Federal IT official currently working in government. This is one part of an extensive, firsthand account of how IT decisions are made, the obstacles standing in the way of real change in government technology management, and what one career Federal IT employee really thinks about the way government does IT.[…]
Ransomware attacks, which the FBI estimated could cost the United States $1 billion this year, have “become a real plague on the Internet,” according to Sen. Sheldon Whitehouse, D-R.I. As these attacks are becoming more sophisticated and destructive, the Senate Committee on the Judiciary addressed whether law enforcement has the right tools to foil them.[…]
NASA’s progress meeting the requirements of FITARA has been anything but out of this world. Members of the House Oversight and Government Reform Committee voiced disappointment at the mediocre progress made by most agency chief information officers, but NASA, arguably the most high-tech of all Federal agencies, was the only one to receive an F.[…]
Most Federal agencies received slightly better grades for their progress under the Federal Information Technology Acquisition Reform Act, according to the annual scorecard released ahead of a hearing on Capitol Hill.[…]
The sun could pose the largest digital security risk to U.S. critical infrastructure, according to witnesses at a House Oversight and Management Efficiency Subcommittee. “All critical infrastructure sectors are at risk from EMP [electromagnetic pulse],” said Brandon Wales at DHS.[…]
Industry executives urged the Federal government to do more to advance the use of blockchain technology to secure online financial transactions, and to get behind nationwide adoption of cybersecurity insurance.
Disrupt or be disrupted. That’s the way Dave Dimond, chief technology officer for Global Healthcare Business at EMC Corp., sees the IT business—especially for those in the rapidly changing health care sector. Dimond said the challenge health care providers face has everything to do with meeting patient expectations in a world “where they want things, and they want them now.”[…]
Applicants for Federal security clearances may want to double check their Twitter feeds, as agencies could soon be moving forward with investigations into applicants’ social media accounts. The biggest obstacle to these investigations, however, is not privacy concerns, but rather data security.[…]
Cyber espionage group Pawn Storm has launched further attacks on U.S. allies, Trend Micro reported. Pawn Storm last month targeted Germany for a second time, through an attack on the German Christian Democratic Union, Chancellor Angela Merkel’s political party.[…]
Secretary of Defense Ash Carter announced a significant expansion of the Pentagon’s Silicon Valley-based experimental technology unit, including dedicated funding pipelines, a new partnership leadership structure, and plans to stand up a second unit in Boston.