Smarter Gov Tech, Stronger MerITocracy
Army
NIST

The National Institute of Standards and Technology (NIST) released a plan on Aug. 10 to prioritize Federal agency engagement in developing standards for artificial intelligence (AI), just before the deadline of an executive order issued in February that gave the agency 180 days to develop a plan. […]

U.S. Customs and Border Protection (CBP) is seeking to both expand facial recognition capabilities in its vetting of international travelers and migrate its traveler-processing technology to the cloud, according to an Aug. 8 CBP solicitation. […]

While the Continuous Diagnostics and Mitigation (CDM) program is here to stay for Federal agencies, taking proper approaches to data classification, collection, and analysis are key components to optimizing the program’s aims, security experts said last week at MeriTalk’s Cyber Security Brainstorm event. […]

Ron Wyden Oregon
DHS Homeland Security
cloud computing concept -min

As agencies move to the cloud and secure their data there, meeting the new challenges with innovative solutions is a great opportunity – as long as agencies abide by existing security baselines, said Federal IT leaders during MeriTalk’s Cybersecurity Brainstorm. […]

John Felker, who last month was named assistant director of the Cybersecurity and Infrastructure Security Agency’s (CISA) Integrated Operations Division (IOD), on Thursday discussed IOD’s plans to integrate operations of CISA’s three primary component organizations in order to produce better cyber threat data intelligence that will include inputs from Continuous Diagnostics and Mitigation (CDM) programs implemented by Federal agencies. […]

federal workers workforce IT workers employees millennial -min
Air Force

After only two years since the U.S. Air Force’s (USAF) launched Kessel Run, its Branch Chief Erynn Petersen touted the success they have seen in providing USAF with agile and resilient cybersecurity responsiveness at MeriTalk’s Cyber Security Brainstorm today. Petersen also stressed how Kessel Run can pose as a model for other cybersecurity teams. […]

military healthcare, veterans healthcare
Google HQ

The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on Aug. 6 urging the public to “watch out for possible malicious cyber activity seeking to capitalize on” the recent mass shootings in El Paso, Texas, and Dayton, Ohio. […]

identity management-min

Federal agency approaches to identity management don’t have a single approach across the government, but vary to significant degrees with agencies’ mission focus, said LaChelle LeVan, Acting Director for Federal Identity, Credential and Access Management (ICAM) Program Office at the General Services Administration (GSA). […]

Cybersecurity flag
FBI
Cloud computing

Senior Security Architect for the General Services Administration’s (GSA’s) Technology Transformation Services (TTS) and Centers of Excellence (CoE) Dan Jacobs wants agencies and industry alike to heed the lessons GSA has learned from experience and the Black Hat conference over the past 16 years when it comes to securely implementing cloud. […]

Cloud city modernization

The Federal government is looking forward to implementing 5G wireless services as they become available, but building security into 5G services from the beginning will be key to a successful implementation, said officials from the Department of Defense (DoD), the Cybersecurity and Infrastructure Security Agency (CISA), and the General Services Administration (GSA). […]

cloud cyber modernization AI

The Cloud Security Alliance (CSA) released its Top Threats to Cloud Computing Report today. The report, which was created after surveying 241 cloud industry experts, highlights the top 11 threats facing cloud computing. The report noted that cloud security issues are “often the result of the shared, on-demand nature of cloud computing.” […]

Russia hacking hack cyber-min

An August 5 alert issued by Microsoft’s Security Response Center is blowing the whistle on hacking efforts focused on three classes of internet of things (IoT) devices that Microsoft asserts are being attacked by the hacking group it identifies as “Strontium,” better known as the Russia-based cyber espionage group Fancy Bear. […]

FDA website

The U.S. Food and Drug Administration (FDA) is seeking assistance to identify vendors that can provide simulations with virtually implanted generic medical devices using a whole-heart computational model. […]

NIST

Sens. Cory Gardner, R-Colo., and Kyrsten Sinema, D-Ariz., introduced the TOWER Infrastructure Deployment Act (TOWER Act) with the goal of increasing broadband deployment across the country and addressing the workforce shortage within telecommunications industry. […]

While the Department of Veterans Affairs (VA) has completed its migration of existing records into the data center of its electronic health record (EHR) vendor, the VA and Department of Defense (DoD) are jointly searching for a director and deputy to oversee $10 billion, 10-year modernization effort. […]

Categories