The Department of Housing and Urban Development (HUD) is looking to establish an enterprise-wide approach to data analytics in the cloud and application development, according to a request for information (RFI) released Tuesday, April 30. Responses are due May 6. […]
On the Hill, Cybersecurity and Infrastructure Security Agency Chris Krebs made the case for his agency’s FY2020 $3.17 billion budget request – which represents a cut over FY2019 funding levels – during an April 30 House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation hearing. In a rare move, there was strong bipartisan support for increasing the funding request and providing more funding to help improve the nation’s cybersecurity posture. […]
The House Committee on Energy and Commerce Subcommittee on Communications and Technology convened today to discuss the growing number of unwanted robocalls, with an inconclusive conversation and no clear plan to move forward with legislation. […]
A new binding operational directive (BOD) from the Department of Homeland Security (DHS) released Monday, April 29, requires agencies to remediate critical vulnerabilities identified by the Cybersecurity and Infrastructure Security Agency (CISA) within 15 days of detection, a reduction from 30 days. […]
Government Accountability Office (GAO) Director of IT and Cybersecurity Nick Marinos emphasized concerns about the Census Bureau’s IT readiness and cybersecurity ahead of the 2020 census, at a House Appropriations Commerce, Justice, Science, and Related Agencies Subcommittee oversight hearing today. […]
Professional services company, Accenture, has won a blanket purchase order agreement contract – worth a potential $2 billion – from the Department of Energy (DOE), according to a news release on the company’s website. […]
The Government Accountability Office (GAO) issued a report today that shines a light on nine Federal agencies for 12 practices the agencies adopted to help them more effectively implement FITARA (Federal Information Technology Acquisition Reform Act) provisions. […]
As technology changes mission requirements, the management of human capital, and how work is done at the Federal level, the Government Accountability Office (GAO) released a new report today recommending how Federal agencies should remain cognizant of emerging tech’s impact on managing and maintaining their workforce. […]
With the release of the Office of Management and Budget’s (OMB’s) new memo on shared services, the General Services Administration is looking to the opportunity to support the whole-of-government approach that the memo supports, said Keith Nakasone, deputy assistance commissioner for IT Acquisition at the Federal Acquisition Service (FAS). […]
The House Energy and Commerce Committee’s Communications and Technology Subcommittee is getting ready for Tuesday’s hearing on unwanted robocalls. The hearing – which will include expert testimony from academia, consumer interest groups, and technology interest groups – will cover seven legislative measures that lawmakers unveiled today. […]
Anil Cheriyan, head of the General Services Administration’s (GSA’s) Technology Transformation Services unit (TTS), shared details today on his office’s new work in the areas of robotic process automation (RPA) and identity proofing. […]
The U.S. Department of Agriculture (USDA) is searching for information on improving its data repository and user interface design. […]
Cybersecurity and the acquisition of a new Coast Guard electronic health records (EHR) system remain on the Government Accountability Office’s (GAO’s) list of open priority recommendations for the Department of Homeland Security (DHS). […]
The Government Accountability Office (GAO) provided an update on the 19 recommendations it made to the Environmental Protection Agency (EPA) made in March 2018 and of those recommendations, the EPA has taken actions to improve on five of the recommendations as of April 2019. […]
The Defense Department’s (DoD’s) immature global supply chain networks for moving F-35 aircraft parts have largely contributed to F-35 spare parts shortages and difficulties managing and moving parts around the world, the Government Accountability Office (GAO) found in an April 25 report. […]
The National Institute of Standards and Technology (NIST) released draft guidance on securing internet of things (IoT) devices for small business and home applications so that manufacturers can create products that only transmit data in approved ways. […]
The Department of Veterans Affairs (VA) doesn’t have any current plans to utilize artificial intelligence in its operations, but mostly because it hasn’t yet found a practical use for the technology. […]
The IRS should continue improving its electronic authentication security controls to better protect public-facing applications, the Treasury Inspector General for Tax Administration (TIGTA) said in a report last week. […]
The General Services Administration (GSA) has developed dashboards for both agency acquisition spending management and small businesses to help track spending and help support small businesses in Federal acquisition, which have been key in working toward achieving the President Management Agenda goals, GSA IT Category Management Deputy Assistant Commissioner Laura Stanton said today. […]
Data-sharing isn’t solely about collecting data, but rather who can provide the best value to data in an environment that encourages open-data. […]
For the Cybersecurity Infrastructure Security Agency (CISA) within the Department of Homeland Security (DHS) and General Services Administration (GSA), acquisition of new technologies and methodologies requires making sure that all the right processes and controls are in place. […]
David Hoffman, Intel’s associate general counsel and global privacy officer, said in a blog post on April 22 that the Federal Trade Commission (FTC) needs to be given more authority to rein in the activities of data brokers. […]
To make cybersecurity more effective in Federal healthcare, security professionals need to bring a broad swath of folks to the table to build security into technology from the beginning while still enabling the mission, said a panel of Federal chief information security officers and cybersecurity leaders at ACT-IAC’s Health Security, Privacy, and Practice Forum on April 23. […]
Over the past couple of years, the Department of Homeland Security’s (DHS) Critical Infrastructure and Security Agency (CISA) has been asking itself several questions to increase cross-agency governance for cybersecurity and supply chain management. […]
The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and Science and Technology Directorate (S&T) published a five-year Broad Agency Announcement (BAA) looking to develop new mobile communications security standards. […]
Secretary of State Mike Pompeo said that a cyberattack could, “in certain circumstances, constitute an armed attack under Article 5 of the U.S.-Japan Security Treaty,” and that the United States would defend Japan in that circumstance. […]
The Government Accountability Office (GAO) today critiqued the lack of IT interoperability, among other shortfalls, in the Departments of Veterans Affairs (VA) and Health and Human Services’ Indian Health Service (IHS) memorandum of understanding (MOU) to improve healthcare for American Indian and Alaska Native (AI/AN) veterans. […]
The Millennium Challenge Corporation (MCC) is seeking to address data-sharing platform gaps that lead to inefficient dissemination of “knowledge” products, and updated a request for information (RFI) on a draft Statement of Work (SOW) for data management services from vendors. […]
The National Institute of Standards and Technology (NIST) updated its Vetting the Security of Mobile Applications guidance document with a new revision. […]
The Department of Health and Human Services’ (HHS) FISMA (Federal Information Security Modernization Act) audit for fiscal year 2018, released today by HHS’ Office of the Inspector General (OIG), shows the agency improved its performance in the “Identify” and “Protect” areas of the framework, while holding steady in other areas. […]