Last year brought a great deal of change to Washington, D.C., from a new administration moving into the White House to D.C. United building a new stadium. As 2018 starts up with seemingly limitless IT opportunities ahead, MeriTalk takes a look back on the top Federal IT stories from 2017. […]

After years on the backburner, electronic warfare (EW) is moving up the ranks as an integral part of the Pentagon’s military focus. The Army last month received approval to move ground-based EW efforts into the Terrestrial Layer Intelligence System, joining cyber, signals, and other intelligence as part of the Multi-Function Electronic Warfare (MFEW) structure. The service wants to include airborne EW later this year. […]

USDA

Usually agencies want to speak highly of their IT operating systems, so to hear Deputy Secretary of the United States Department of Agriculture (USDA) Steve Censky call the USDA operating model “splintered and out of date” on Dec. 14 was a bit of a shock.   […]

Password manager company, Dashlane, has added a twist with its list of the “Worst Password Offenders” of 2017, naming high-profile people and organizations that fell into the bad-password trap. President Trump was deemed the worst offender, primarily because of simple passwords reportedly used by cabinet members and policy directors. Outside parties were also the culprits for the Department of Defense, specifically for its contractor, Booz Allen, as well as the Republican Party (stemming from a careless data analytics firm). Paul Manafort, for using “Bond007” as a password, and Sean Spicer, for apparently tweeting his passwords, also came in for scorn. […]

Email is a core network application for both the private sector the and government, and has become an essential business communication tool. Since email is nearly ubiquitous and often poorly secured, it also has become a vector for fraud and data theft. Phishing emails can compromise not only Federal networks and databases, but also trust in government communications. […]

Since blockchain first appeared in 2009 as the digital ledger for Bitcoin cryptocurrency transactions, it has steadily taken the online world by storm, in the process practically becoming a synonym for security. Even if a lot of people still don’t know what it is, they’re beginning to hear it more and more. IBM, for instance, has taken to mentioning “blockchain for security” in its TV ads. And in a sure sign of pending mainstream acceptance, a “Blockchain for Dummies” book is now available. […]

With rapid growth in smart devices, exploding data volumes, and the shift to the cloud, it is becoming more and more challenging to protect critical systems and information. Government and industry leaders convened at the Symantec Government Symposium in Washington, D.C. on Tuesday to discuss these complex challenges and the solutions needed to address them. […]

Two House panels investigating the Equifax Inc. data breach are zeroing in on “technical and process” failures that led to the loss of personally identifiable information, including Social Security numbers, belonging to more than 145 million Americans, according to recently released documents. […]

The Army and Navy recently announced that their Cyber Mission Teams were fully operational, and the U.S. Cyber Command now has all of their planned complement of 133 teams in business. With its people (totaling more than 6,000 service members and civilians) in place, U.S. cyber forces can now look to machines to help carry out effective operations in the cyber domain. […]

A team at the Georgia Institute of Technology, backed by the Defense Department’s research arm, is developing tool that will give cybersecurity investigators that kind of look at a cyber intrusion, quickly providing layers of detail not currently available, in what researchers say is the first instance of automated forensics. […]

As Feds get smarter about Artificial Intelligence on the cyber frontier, seems agencies’ IT defenders are suffering from schizophrenia about cyber cyborgs. That’s the topline takeaway from the new MeriTalk “Federal Cyber AI IQ Test” study. […]

In a bipartisan effort, Harvard University’s Belfer Center for Science and International Affairs is looking to protect elections from cyberattacks and propaganda. The Cybersecurity Campaign Playbook, released today, gives campaign officials simple, actionable information to better secure campaign information from adversaries attempting to use cyberattacks. […]

With $5 billion in global revenue, Symantec is the 500 pound yellow gorilla in the cybersecurity business. Some dimensions on the beast: installed at every Federal cabinet-level agency; supports 350,000 customers; tracks 700,000 hackers; and leverages more than nine trillion elements of security data. Now, that’s a big monkey. […]

In the event of a cyberattack, it’s important for information about the attack to be shared with the public in order to prevent further problems. Jeanette Manfra, assistant secretary for the Office of Cybersecurity and Communications at the Department of Homeland Security, said that the agency shares timely, accurate information with its partners and constituents so that they can take proper action to protect themselves. […]

The May Cybersecurity Executive Order and the White House’s IT Modernization Report have encouraged agencies to look for ways to use shared services to improve cybersecurity. The Department of Justice has been looking into using shared services before the push from the White House, giving the agency a head start at shared services centered on cybersecurity for the enterprise. […]

The Justice Department has evidence to charge six Russian government officials for involvement in the hack of the Democratic National Committee. U.S. authorities are considering charging the Russian officials to make it difficult for them to travel, but they are unlikely to be arrested and prosecuted in the U.S. […]

Tanium, along with its partner World Wide Technology, received a potential five-year, $750 million contract from the Defense Innovation Unit Experimental (DIUx), the Defense Department’s Silicon Valley outfit, to provide managed cybersecurity services to Federal agencies. […]

The Department of Commerce has made strides to manage the IT costs and oversight of new systems before the 2020 Census, after reports of poor oversight and planning. A Government Accountability Office report, released in October, found that the Census Bureau faced challenges in managing and overseeing the IT programs, systems, and contracts supporting the 2020 Census. […]

The Continuous Diagnostics and Mitigation Program last week held its first data exchange between the Federal CDM dashboard and an agency dashboard. All of the CFO Federal agencies have agency dashboards to comply with the CDM program, and the Federal dashboard is in production. […]

The Department of Energy plans to roll out an enterprise risk management framework that would provide cybersecurity data about the agency in one place and enable better information sharing between departments.
“The enemy isn’t a hacker in the basement,” said Micah Czigan, director of the Integrated Joint Cybersecurity Coordination Center for DOE. “The enemy is a world power nation-state.” […]

Sen. Sheldon Whitehouse, D-R.I., said that he is concerned about the Trump administration’s widespread adoption of the NIST Cybersecurity Framework. “The NIST Framework has never been adequately validated,” he said, adding that he wonders whether agencies have accepted it because it’s effective or because “compliance demands so little effort.” […]

Representatives from Facebook, Twitter, and Google told Congress on Oct. 31 that they’ve had to learn how to combat nontraditional cyberattacks, like the spread of disinformation, rather than focusing on malware attacks alone to protect consumers. […]

Following a House hearing on the cyber workforce shortage, the Department of Homeland Security released information about cyber training programs. […]

Cybersecurity experts offered solutions to protect the U.S. electric grid, including moving the grid off of the public Internet, and using quantum encryption capabilities. “The nation’s electrical grid is a vital resource upon which our economy and our citizens’ daily lives depend,” said Richard Raines, director of the Electrical and Electronics Systems Research Division at Oak Ridge National Laboratory. “It is also a system that is highly vulnerable to cyber intrusions as more and more utility controls and ‘smart’ technologies rely on public Internet connections.” […]

Categories