Members of the House Energy and Commerce’s Committee’s Communications and Technology Subcommittee expressed broad agreement today that the Federal government needs to do more to promote the availability of broadband service in underserved and unserved areas of the United States, but appeared to signal little in the way of any unified sentiment to coalesce around any of several existing bills that aim for that goal. […]

CGI Federal has won a task order worth an estimated $530 million to provide services under the Continuous Diagnostics and Mitigation (CDM) Program to CDM’s Group C Federal agencies, a CGI spokesperson confirmed today. […]

The Hide ‘N Seek (HNS) Internet of Things (IoT) botnet, which initially targeted home routers, IP cameras, and video recorders, has been expanded by cybercriminals to target two NoSQL database servers, making it a cross-platform botnet. […]

It’s the Monday after a 6-goal barnburner in the World Cup final, a torrential downpour trophy ceremony, and we’ve now entered the era of existential dread for the world’s soccer fans. Reality sets in. It’s four years until the world’s biggest sporting event comes back around. […]

Irv Dennis, chief financial officer at the Department of Housing and Urban Development (HUD), on Thursday described HUD’s plan to use the largest-awarded sum from the Technology Modernization Fund (TMF)–including timelines for rollout and repayment–in an appearance on Government Matters. […]

Adopting cloud isn’t a one-size-fits-all proposition for Federal agencies. Instead, agencies looking to modernize their enterprise IT are customizing their adoption approach to fit their agencies’ structure, according to government and industry executives leading a Capital Exchange webinar on July 12. […]

Using digital records instead of paper-based ones can save government agencies money and help them provide better service to their constituencies, said speakers during Government Technology’s “Going Paperless: How to Do It and What You Will Gain” webinar on July 11. […]

The term “information warfare” might call to mind Russian trolls exploiting social media, but there has always been a lot more to it than disinformation campaigns on Twitter, or for that matter the airborne propaganda leaflets or Tokyo Roses of wars gone by. Information warfare, or IW, is a key element of every military operation. It spans cyberspace and the electromagnetic spectrum, involving communications of all kinds such as Global Positioning System readings and satellite operations, as well as economic transactions, every level of surveillance, and old-school radio and TV. […]

The House Energy and Commerce Committee today approved by voice vote a measure that would direct Federal agencies to study Internet of Things (IoT) technologies and whether to regulate them, along with two others aimed at spurring further rollout of broadband services in mostly rural areas of the United States. […]

Amid mounting concern about attacks by foreign adversaries on the Department of Homeland Security’s supply chain, two House subcommittees met today to discuss that threat and legislation proposed by the White House–the Federal Information Technology Supply Chain Risk Management Improvement Act–that would respond to the problem. […]

The House Veterans’ Affairs Committee today officially approved the creation of a new Technology Modernization Subcommittee to oversee the Department of Veterans Affairs’ Electronic Health Record (EHR) modernization and other major IT projects. […]

Alexander Kott, chief scientist at the U.S. Army Research Laboratory, said Wednesday at the Defense Systems Summit that creating artificial intelligence (AI) and machine learning (ML) solutions for complex battlefield environments requires different prioritization than commercial solutions, and offered four tips for defense organizations looking to implement. […]

Department of Defense (DoD) Chief Information Officer Dana Deasy said today at the Defense Systems Summit that he has identified four “key strategic areas” that will work to support the National Defense Strategy (NDS). Those four areas – cloud, artificial intelligence, C3 (command, control, and communications), and cybersecurity – are organized not in order of importance, but rather “order of integration,” Deasy said, with each of the priorities flowing from the prior one. […]

Members of the House Energy and Commerce Committee’s Communications and Technology Subcommittee sparred today over competing bills that would address online data privacy generally and protection of customer proprietary network information (CPNI) specifically, but appeared to make little headway toward consensus on how to proceed on legislative measures that have languished in the committee since being introduced last year. […]

At today’s TBM Council Public Sector Summit, three government leaders stressed the importance of evolving the Federal government’s Capital Planning and Investment Control (CPIC) process and the role Technology Business Management (TBM) can play in that evolution. […]

Paul Craft, director of operations at the Joint Force Headquarters Department of Defense Information Network (JFHQ-DoDIN), spoke today at the Defense Systems Summit about how his relatively new component of U.S. Cyber Command is now tasked with operating and securing the entirety of DoD’s sprawling IT network infrastructure and has undertaken a complete restructuring of network operations for all of DoD. […]

Federal CIO Suzette Kent and General Services Administration (GSA) CIO David Shive both offered their support for using Technology Business Management (TBM) in Federal agencies at today’s TBM Council Public Sector Summit. […]

Dana Deasy, chief information officer at the Department of Defense (DoD), said today at the Defense Systems Summit that he would not commit to an official release date for the finalized request for proposal (RFP) for DoD’s Joint Enterprise Defense Infrastructure (JEDI) cloud contract. […]

Department of Justice Assistant Attorney General Stephen Boyd said Monday in a letter to Sen. Mark Warner, D-Va., that DoJ reached a premature conclusion in stating that stolen personal information used in a credit fraud case in Virginia was acquired from the 2015 Office of Personnel Management (OPM) data breach. […]

Categories