Smarter Gov Tech, Stronger MerITocracy

Rep. Jim Langevin, D-R.I., co-chair of the Congressional Cybersecurity Caucus, applauded the Federal government’s handling earlier this week of public disclosure by the intelligence community of serious vulnerabilities it found in Microsoft’s Windows 10 and Service 2016 products, for which the company released patches. […]

Health and Human Services HHS

The Department of Health and Human Services (HHS) CIO Jose Arrieta said Accelerate will be able to save the department “somewhere around $33 to $40 million” over the next five years. […]

data sharing

MeriTalk recently connected with Cisco’s Will Ash, Senior Director of Security Sales, and Peter Romness, Cybersecurity Solutions Lead, U.S. Public Sector CTO Office, on the current cyber threat landscape, how Zero Trust plays into agencies’ evolving cyber defense plans, and the importance of public-private sector collaboration. […]

Reps. Tim Walberg, R-Mich., and Bobby Rush, D-Ill., introduced the Preventing Real Online Threats Endangering Children Today (PROTECT) Kids Act on Jan. 9. […]

Cybersecurity cyber

The Office of the Director of National Intelligence (ODNI) and the National Security Agency (NSA) are both working on less classified methods of cyberthreat information sharing, according to two officials at a FedInsider webinar on Jan. 9. […]

The National Cybersecurity Center of Excellence (NCCoE) has invited eight companies to participate as technology collaborators in the Securing the Industrial Internet of Things (IIoT): Cybersecurity for Distributed Energy Resources Project (DERS). […]

Cyber workforce
capitol washington dc senate house congress-min

Sen. Angus King, I-Maine, and Rep. Mike Gallagher, R-Wis., alluded to recommendations, ideologies, and methods of the forthcoming Cyberspace Solarium Commission report at a Council on Foreign Relations event on Jan. 7 – but resisted making the big reveal with harder news about the report’s findings. […]

cybersecurity chip AI

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) is conducting market research for potential vendors and industry feedback on a governmentwide vulnerability disclosure platform (VDP). […]

Iran

Rising political and military tensions between the United States and Iran have led to renewed calls for securing government and private-sector critical systems in the event that the conflict leads to malicious cyber activity against U.S. assets. […]

The present and future state of Federal IT has monumental challenges to address – modernization, data utilization, and automation just to name a few – but none are so critical, or enduring, as cybersecurity. It’s the threat that will never fully go away – and where eternal vigilance, and innovation, are the price of liberty. […]

The Office of Personnel Management (OPM) made progress during Fiscal Year 2019 on cybersecurity issues, and closed eight prior recommendations from its Office of Inspector General (IG) during the year, according to the IG’s 2019 Federal Information Security Modernization Act (FISMA) audit. […]

cyber workforce

Federal agencies and the Office of Management and Budget (OMB) need to continue notching progress  on IT acquisitions, operations, and cybersecurity necessary to meeting FITARA (Federal Information Technology Acquisition Reform Act) requirements, the Government Accountability Office (GAO) said. […]

Treasury

The Treasury Department Office of the Inspector General (OIG) reported that the agency’s cyber threat indicators in Calendar Year (CY) 2017 and CY2018 were “adequate and aligned with the provisions of CISA [the Cybersecurity Information Sharing Act of 2015]” in an audit released on Dec. 10. […]

cyber workforce

The Federal District Court for the Northern District of Ohio announced lengthy U.S. prison sentences for two Romanian nationals for their roles in infecting more than 400,000 computers with malware in order to steal and resell data resulting in financial losses of about $4 million. […]

While figures vary across industry and government as to the size of the “phishing-prone” population in any organization, both sides agree that sustained internal employee training efforts are necessary to cut the success rate of spear-phishing exploits down to more manageable levels. […]

map global connected network world globe-min

Categories