Smarter Gov Tech, Stronger MerITocracy
Cybersecurity flag

In a report released Wednesday, the Foundation for Defense of Democracies called for an operating plan for cyber warfare similar to the Single Integrated Operational Plan (SIOP) the United States had during the Cold War. […]

Cyber Security Brainstorm
Cyber America Connected Internet of things
Cybersecurity flag

The National Intelligence Strategy, released yesterday by the Office of the Director of National Intelligence (ODNI), names cyber threat intelligence as one of seven mission objectives for the intelligence community, and addresses threats and opportunities from emerging technologies. […]

DHS Homeland Security

The Department of Homeland Security (DHS) issued an emergency order on Tuesday afternoon in an effort to mitigate Domain Name System (DNS) infrastructure tampering. DHS and the Cybersecurity and Infrastructure Security Agency (CISA) have been tracking incidents of tampering where multiple executive branch agency domains were impacted. […]

According to the Nexusguard Q3 2018 Threat Report, 65.5 percent of distributed denial-of-service attacks were launched against communications service providers (CSPs) in the third quarter of 2018. […]

Federal agencies cannot develop an effective strategy to migrate workloads to the cloud without having a solid data strategy in place, according to a leading cloud expert at Booz Allen Hamilton. […]

Veterans Affairs VA Vets

The Department of Veterans Affairs awarded a $9.9 million contract to establish and manage a new cloud platform for the agency’s mobile applications to Booz Allen Hamilton. […]

capitol washington dc senate house congress-min

Reps. Dutch Ruppersberger, D-Md.; Jim Himes, D-Conn.; Will Hurd, R-Texas; and Mike Conaway, R-Texas, have introduced legislation to create an Office of Critical Technologies & Security at the White House to coordinate action across Federal agencies and develop a “whole of government” strategy to combat theft of U.S. technologies by state actors including China, and to reduce risks to “critical supply chains.” This bill is a companion bill to one that was introduced in the Senate on Jan. 4 by Sens. Mark Warner, D-Va., and Marco Rubio, R-Fla. […]

ransomware

North Carolina Attorney General Josh Stein released a report on Thursday that highlights the impact of data breaches on the state in 2018, and paired the report with a bipartisan bill to strengthen breach notifications to include ransomware attacks. […]

As Federal agency leaders look to modernize networks and provide better citizen services, they need to have a “Citizen First” mentality, rather than “Cloud First” or “Cloud Smart,” Claire Bailey, director of Federal, State and Local Mainframe Solutions at Compuware, told MeriTalk. […]

Cyber Security Brainstorm

With emerging technologies like artificial intelligence (AI) and blockchain continuing to reveal their capabilities to the marketplace, Federal IT leaders discussed the potential–and the pitfalls–of implementing new technology in government during a Thursday session at an event hosted by the Armed Forces Communications and Electronics Association (AFCEA). […]

General Services Administration GSA

The General Services Administration (GSA) is planning to issue a draft request by the end of January to solicit information on a purchase agreement to develop a cloud computing service called Defense Enterprise Office Solutions (DEOS) to update the Department of Defense’s (DoD) legacy information technology applications. […]

With nation-state cyberattacks increasingly targeting businesses, the Federal government must take action to collaborate and communicate with the private sector in a whole-of-government approach, said current and former officials from the Department of Justice on Tuesday. […]

Cybersecurity flag

The Department of Justice (DoJ) charged two Ukrainian hackers for their roles in “a large-scale, international conspiracy to hack into the Securities and Exchange Commission’s (SEC) computer systems and profit by trading on critical information they stole.” […]

Invalid post type: event_post_type
CDM RSA

Cyber talent shortage, rapidly evolving threats, and unique agency policies are every day security challenges for today’s government cyber professionals. DHS’s CDM program provides light at the end of this long tunnel of challenges. […]

Federal Cloud Flag

While the Federal IT community is eager to embrace the benefits of cloud services, agency leaders are working to balance the transition to cloud with Federal policies and maintaining continuous operations, deputy CIOs from the Air Force and the Department of Veterans Affairs (VA) told the crowd at CES-Government on Friday in Las Vegas. […]

cloud computing concept -min

A multi-cloud environment offers Federal agencies the advantages of high resiliency combined with the agility to adapt quickly to changing mission and technology requirements. But if migrating workloads to one cloud environment expands the attack surface, imagine how multiple clouds can extend the attack surface even more. […]

.gov website cybersecurity government
cloud computing concept -min

Recent studies on cloud technology and its perceptions in the market reveal concerns over accountability for security in the cloud, poorly communicated cloud strategies, and confusion over what the approach to cloud really means. […]

Cyber America Connected Internet of things
hybrid cloud multi cloud computing in the cloud

The Marine Corps Systems Command sent out a request for information on January 7, looking for help in migrating applications from on-prem to commercial cloud environments. Responses are due by January 23. […]

Cyber workforce people
Military Data Center

The United States Transportation Command (USTRANSCOM) released a request for information yesterday for IT support services for the Surface Deployment and Distribution Command (SDDC), with a focus on shifting to cloud. Responses are due by January 24. […]

Cybersecurity flag

Federal agency demand for CDM (Continuous Diagnostics and Mitigation) security technologies has plenty of room for continued growth based on a GAO report released in late December, which showed mixed progress on agency deployment figures for the first half of 2018. The report underlined the importance of CDM progress and chided Federal agencies for being slow to implement the government’s approach to network security. […]

elections, voting, election security, midterms

Matthew Blaze, a voting security researcher, announced Monday that he is leaving the University of Pennsylvania for Georgetown University, where he will be the McDevitt Chair of Computer Science and Law. […]

Modernization, Army, cybersecurity, technology

The U.S. Military Academy at West Point will upgrade its email services to a cloud-based model, which the academy said will help facilitate projects and information sharing anywhere, rather than restricting email service to network-capable devices. […]

Categories