secret service

The Secret Service has an interesting class photo….The CIA is taking cues from the advertising technology industry….IARPA is investing in research into homomorphic encryption—a potential game-changer in the worlds of privacy and security that enables encrypted queries of encrypted databases….And synthetic biology is keeping Jason Matheny up at night. […]

A pile of fake money representing the $150,000 spent on the FedRAMP dashboard was presented as an example of agency spending waste. (Photo: MeriTalk)

The storm clearly has not passed for some big programs run by the General Services Administration, including FedRAMP’s spending of $150,000 in taxpayer money to duplicate an online dashboard capability that had already been developed in the private sector and made available to the government for free….Also, Rep. Will Hurd, R-Texas, is back with another bill aimed at IT modernization.



The Situation Report has the benefit of an intelligence collection network that is reporting some interesting twists and turns in the White House’s finally completed search for the government’s first Federal CISO.


FBI Director James Comey speaks Aug. 30 at the Symantec Government Symposium in Washington, D.C. (Photo: MeriTalk)
(Image: Shutterstock)

The Pentagon’s latest buzz phrase is Identity Activities, which means the Pentagon wants to employ data analysis tools that will leverage biographical, biological, behavioral, and reputational data inputs to help the military determine the identity of a person they encounter on the battlefield and whether that person poses a threat.


airport scanner

The TSA last week discovered in a carry-on bag a loaded gun that was constructed of parts made with a 3-D printer….The Veterans Administration is actively pondering what it will require to manage transitioning from its legacy electronic health record, known as VistA, to a commercial EHR….And who’s keeping track of that teleworking equipment at the U.S. Patent and Trademark office?


banking security

Bank regulations focusing on “too big to fail” have ignited a flurry of mergers and acquisitions in the financial industry, which in turn has created a legacy system vulnerability problem that may be responsible for the majority of data breaches reported to date….And over at DoD, as defense contract obligations reached record highs in 2008, the size of the acquisition workforce in the Defense Department actually shrunk.


WASHINGTON - Secretary of Homeland Security Jeh Johnson hosts President Obama at the National Cybersecurity and Communications Integration Center, Jan. 13, 2015. (Photo: DHS)

The Department of Homeland Security’s long-standing plans to reorganize the National Protection Programs Directorate to better deal with the growing threat of cyberattacks on national critical infrastructure may have received the boost it needed this week to obtain congressional approval.


1 2 3 4