Smarter Gov Tech, Stronger MerITocracy
Navy seal

Public comments on the Office of Management and Budget’s (OMB’s) draft Data Center Optimization Initiative (DCOI) policy show a desire for OMB to continue the push for modernization amid new metrics and a shift towards optimization over data center closures. […]

State Department

The State Department is looking to secure its mobile devices and protect against malicious apps–with an app. The department released a request for information on Dec. 20, asking vendors for information about an endpoint protection platform for mobile devices. Responses are due by Jan. 18. […]

Labor

The Department of Labor on Dec. 27 released a request for information on a proposal for a new financial management system, with an eye towards a potential move to the cloud and data analytics capabilities. Responses are due by 11 AM on January 16. […]

NSF

The Office of the Inspector General (OIG) at the National Science Foundation (NSF) found that NSF could improve its mobile device security after finding devices that were not enrolled in the agency’s management program, and finding inappropriate apps on work devices. The agency agreed with those recommendations. […]

The Department of Health and Human Services (HHS) last week released its Health Industry Cybersecurity Practices, a set of voluntary cybersecurity guidelines for the private sector that leverages the National Institute of Standards and Technology (NIST) Cybersecurity Framework to address cybersecurity issues across healthcare organizations of all sizes. […]

Natural disaster flood min
AI Cyber World machine learning-min
password IAM ICAM easy pwd admin priviliges identity access management authentication credential
Cyber Security Brainstorm

Goldman Sachs announced Wednesday that Ret. Vice Admiral Jan Tighe, the former deputy chief of Naval Operations for Information Warfare and director of Naval Intelligence, is joining its board of directors. […]

The Global Cyber Alliance (GCA), an international and cross-sector effort aimed at eradicating cyber risk, announced Thursday that Deloitte had joined the Alliance. […]

Phone mobile security protection

The explosive use of mobile technologies by citizens and an increasingly mobile Federal workforce is driving the need for greater visibility and security in mobile environments. As a result, the government is looking to continuous diagnostic and mitigation solutions working in conjunction with mobile device management (MDM) solutions to give agencies better awareness into mobile application and devices. […]

Military AI

Pentagon officials are certain that two of the biggest keys to the future of national security are two technologies that, for different reasons, are shrouded in a bit of uncertainty: artificial intelligence and cloud computing. […]

Washington DC capitol federal government-min

Sen. Maria Cantwell, D-Wash., and Rep. Frank Pallone, Jr., D-N.J., today wrote Department of Homeland Security (DHS) Secretary Kirstjen Nielsen and called for her to “take urgent action to protect America’s pipelines from cyber attack.” The letter follows a report released today from the Government Accountability Office (GAO) which detailed issues American pipelines face defending against cyber attacks. […]

Pentagon Military Defense DoD
Capitol Washington DC Federal
Russia hacking hack cyber-min
NASA

According to an internal memo obtained by SpaceRef, the National Aeronautics and Space Administration (NASA) suffered a breach of employee personally identifiable information (PII), leaving civil service employees who worked for the agency from July 2006 to October 2018 potentially affected. […]

NIST
Invalid post type: event_post_type
CDM Central

Top cyber experts struggle to pinpoint the coordinates for successful risk management. DHS’ CDM program is helping agencies locate which direction cybercriminals and attackers are headed. This includes increased focus on securing beyond the perimeter, safeguarding mobile devices, and protecting sensitive data in the cloud. […]

hybrid cloud multi cloud computing in the cloud

Cloud computing offers benefits and efficiencies, but agencies need to go through the application rationalization process and decide what works best for their situation, said Deputy Federal CIO Margie Graves and Department of Homeland Security (DHS) Deputy CIO Steve Rice. […]

Invalid post type: event_post_type
CSX Brainstorm

Today’s cyber landscape can feel like the Wild West for government IT leaders. Endless cloud filled skies, open landscapes, perimeter free endpoints – a cyber frontier vulnerable to attack from all sides. […]

cloud cyber modernization AI
Invalid post type: event_post_type
CDM & Eggs

From DEFEND and .govCar, to the RFS process and AWARE, the CDM program constantly evolves to meet the cybersecurity needs of Federal agencies. […]

Phone mobile security protection

Even anonymity doesn’t guarantee privacy. Not even in a crowd of millions. That’s the finding of a new study by Massachusetts Institute of Technology (MIT) researchers who found that anonymized mobility data can still result in privacy risks when that data is combined with data from other sources. Data–lots of it–is widely seen as the key to better planning for cities, transportation lines, and any kind of mobility services. But collecting all that data has an unintended privacy risk, even when taking pains to protect people’s identities. […]

Washington DC capitol federal government-min

A group of 15 Democratic senators introduced a new piece of data privacy legislation on Wednesday. The legislation, named the Data Care Act, will, according to the bill’s lead sponsor Sen. Brian Schatz, D-Hawaii, “require websites, apps, and other online providers to take responsible steps to safeguard personal information and stop the misuse of users’ data.” […]

cloud computing concept -min

Expect to see more data breaches, attacks on critical infrastructure in the cloud, and more research into vulnerabilities into cloud computing in 2019, according to studies on upcoming threats in the new year. […]

In today’s Senate Judiciary Committee hearing, the Committee dug into what it called “China’s non-traditional espionage against the United States.” During the hearing, senators heard from cybersecurity, and intelligence experts about China’s attempts to use cybersecurity attacks and intellectual property theft to advance its global standing. […]

Federal Cloud Flag

Federal officials are looking at 2019 as the year of the hybrid cloud, as agencies shift from the Cloud First policy of moving pell-mell into as-a-service models to the Cloud Smart policy, which focuses more on making cloud work with legacy systems and serving agency missions. […]

Categories