Smarter Gov Tech, Stronger MerITocracy

Information systems trade group ISACA released results of a survey today that finds 70 percent of cybersecurity managers and practitioners believe that their organizations’ cybersecurity teams are understaffed. […]

elections, voting, election security, midterms

The Congressional Budget Office (CBO), in a report released Friday, pegged the cost of H.R. 1–the For the People Act of 2019–at $2.6 billion over the next five years, with $1.5 billion of that going for states and counties to purchase new voting technology. […]

federal workers workforce IT workers employees millennial -min
capitol washington dc senate house congress-min
Cybersecurity flag

Lawmakers from both sides of the aisle and both houses of Congress joined together on Thursday to reintroduce the Help Americans Never Get Unwanted Phone calls, or HANGUP Act. […]

quantum computing chip ai -min

Officials from the intelligence community on Thursday discussed the importance of using artificial intelligence to process and analyze the large amount of collected data by agencies, thus freeing analysts to shift their efforts toward looking into anomalies identified by AI. […]

5G Broadband rural broadband FCC-min
capitol washington dc senate house congress-min

The Senate Judiciary Committee on Thursday approved the nominations of former FCC Enforcement Bureau Chief Travis LeBlanc and Aditya Bamzai, formerly of the Department of Justice’s Office of Legal Counsel and National Security Division, to the Privacy and Civil Liberties Oversight Board (PCLOB). […]

military dod army AI innovation cyber command

The Government Accountability Office said in Feb. 25 report that the Defense Department needs to get a better handle on its very considerable weapons systems software sustainment costs, which it estimated may run at least $15 billion over the next five years. […]

State Department
Machine learning AI-min
Cybersecurity cyber

John Sherman, CIO of the intelligence community (IC), offered his view today into the principles guiding his office in its efforts to create an enterprise environment for the IC and stay on the cutting edge of technology. […]

IT security technology provider Webroot said in a recently issued threat report document that the United States in 2018 led the rest of the world by a wide margin in hosting what the firm classifies as “high-risk URLs.” […]

Credit rating agency Moody’s said in a report issued today that it considers banks, securities firms, financial market infrastructure, and hospitals at “high risk,” from a ratings perspective, due to their exposure to the impacts of cyberattacks. […]

Cybersecurity flag

The White House’s new National Strategy for Aviation Security calls attention to a rising concern in aviation safety: the potential for cyberattacks on aircraft, a prospect that might just be as scary as it sounds. […]

Pentagon Military Defense DoD

Senior Defense Department officials told House members on Tuesday they are taking additional steps to boost cybersecurity workforce ranks at the Pentagon through means including the Cyber Excepted Service (CES) personnel system authorized in 2016 that allows DoD to expedite and simplify recruiting and hiring for civilian cyber professionals. […]

DOJ Department of Justice
DoD Pentagon Military

As the first chief data officer of the Department of Defense (DoD), Michael Conlin described the challenges of approaching a vast mountain of data from numerous systems at the Pentagon, and making it actionable information for the department. […]

elections, voting, election security, midterms

While much of the country was focused today on the testimony of Michael Cohen–President Trump’s former lawyer–before the House Committee on Oversight and Reform, elsewhere on the Hill the House Committee on Appropriations Financial Services and General Government Subcommittee was hearing testimony on election security. […]

email security DMARC
cloud computing concept -min
Phone mobile security protection

With growing interest in cloud, mobility, and zero-trust technology, industry leaders in the identity credential access and management (ICAM) space are seeing a divergence between the existing policy of Common Access Card (CAC) and personal identity verification (PIV) cards, and new technology. […]

FITARA Awards 2019 - Congressman Will Hurd

During a hearing on Tuesday, members of Congress, including Rep. Will Hurd, R-Texas, shared their concerns about the Department of Veterans Affairs (VA’s) technology efforts with Secretary Robert Wilkie, including the electronic health record modernization (EHR-M) project, FITARA implementation, and telehealth efforts. […]

Categories