Smarter Gov Tech, Stronger MerITocracy
Ron Wyden Oregon
Department of Homeland Security DHS

The Department of Homeland Security (DHS) Small Business Innovation Research (SBIR) program will engage with small businesses in technological research and development Aug. 12-16 in the Southwest part of the National SBIR 2019 Road Tour. SBIR representatives will visit four cities – Tucson, El Paso, Albuquerque, and Boulder, Colo. – one per day in respective […]

DHS Homeland Security
cloud computing concept -min

As agencies move to the cloud and secure their data there, meeting the new challenges with innovative solutions is a great opportunity – as long as agencies abide by existing security baselines, said Federal IT leaders during MeriTalk’s Cybersecurity Brainstorm. […]

John Felker, who last month was named assistant director of the Cybersecurity and Infrastructure Security Agency’s (CISA) Integrated Operations Division (IOD), on Thursday discussed IOD’s plans to integrate operations of CISA’s three primary component organizations in order to produce better cyber threat data intelligence that will include inputs from Continuous Diagnostics and Mitigation (CDM) programs implemented by Federal agencies. […]

Gerry Connolly

With the year quickly coming to a close, the FedRAMP Authorization Act will be one of Rep. Gerry Connolly’s “big priorities” for legislation, with a markup session expected when the House returns from its August recess, Connolly said during MeriTalk’s Cyber Security Brainstorm today. […]

federal workers workforce IT workers employees millennial -min
Air Force

After only two years since the U.S. Air Force’s (USAF) launched Kessel Run, its Branch Chief Erynn Petersen touted the success they have seen in providing USAF with agile and resilient cybersecurity responsiveness at MeriTalk’s Cyber Security Brainstorm today. Petersen also stressed how Kessel Run can pose as a model for other cybersecurity teams. […]

military healthcare, veterans healthcare
Google HQ

The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on Aug. 6 urging the public to “watch out for possible malicious cyber activity seeking to capitalize on” the recent mass shootings in El Paso, Texas, and Dayton, Ohio. […]

General Services Administration GSA

The General Services Administration (GSA) recommends that agencies use IT Schedule 70 to procure solutions to implement Technology Business Management (TBM) practices – including advanced tools like artificial intelligence (AI) and robotics process automation (RPA) – alongside IT financial management solutions. […]

identity management-min

Federal agency approaches to identity management don’t have a single approach across the government, but vary to significant degrees with agencies’ mission focus, said LaChelle LeVan, Acting Director for Federal Identity, Credential and Access Management (ICAM) Program Office at the General Services Administration (GSA). […]

Cybersecurity flag
FBI

Embassy Nassau, the American embassy to the Bahamas, has IT issues that are largely a result of embassy understaffing, according to an August 5 report from the State Department’s Inspector General. […]

Cloud computing

Senior Security Architect for the General Services Administration’s (GSA’s) Technology Transformation Services (TTS) and Centers of Excellence (CoE) Dan Jacobs wants agencies and industry alike to heed the lessons GSA has learned from experience and the Black Hat conference over the past 16 years when it comes to securely implementing cloud. […]

Cloud city modernization

The Federal government is looking forward to implementing 5G wireless services as they become available, but building security into 5G services from the beginning will be key to a successful implementation, said officials from the Department of Defense (DoD), the Cybersecurity and Infrastructure Security Agency (CISA), and the General Services Administration (GSA). […]

cloud cyber modernization AI

The Cloud Security Alliance (CSA) released its Top Threats to Cloud Computing Report today. The report, which was created after surveying 241 cloud industry experts, highlights the top 11 threats facing cloud computing. The report noted that cloud security issues are “often the result of the shared, on-demand nature of cloud computing.” […]

Russia hacking hack cyber-min

An August 5 alert issued by Microsoft’s Security Response Center is blowing the whistle on hacking efforts focused on three classes of internet of things (IoT) devices that Microsoft asserts are being attacked by the hacking group it identifies as “Strontium,” better known as the Russia-based cyber espionage group Fancy Bear. […]

FDA website

The U.S. Food and Drug Administration (FDA) is seeking assistance to identify vendors that can provide simulations with virtually implanted generic medical devices using a whole-heart computational model. […]

IRS

The Internal Revenue Service (IRS) issues close to $360 million in potentially erroneous tax refunds on an annual basis due to the lack of e-filing for amended returns, a process that would cost approximately $4.1 million to implement, according to a July 31 report from the Treasury Inspector General for Tax Administration (TIGTA). […]

No Category Set!
NIST

Categories