Smarter Gov Tech, Stronger MerITocracy

Federal CIO Suzette Kent said today she is “hopeful” that the Federal Data Strategy and guidance on the Foundations for Evidence-Based Policymaking Act will be released “in the next 30 days” by the Office of Management and Budget (OMB). […]

From the still-budding promise of automation technologies to the ever-growing threat of cyber vulnerabilities, partnerships both within the private sector and with the Federal government will shape the contours of large-scale IT advancement in the coming years, explained Yogesh Khanna, CTO at General Dynamics Information Technology, at GDIT’s Emerge event in Washington on Tuesday. […]

healthcare cyber-min

To make cybersecurity more effective in Federal healthcare, security professionals need to bring a broad swath of folks to the table to build security into technology from the beginning while still enabling the mission, said a panel of Federal chief information security officers and cybersecurity leaders at ACT-IAC’s Health Security, Privacy, and Practice Forum on April 23. […]

Federal CIO Suzette Kent emphasized in an address today to tech-sector officials the importance of scaling, sustaining, and “industrializing” technology advancements notched by the Federal government including those featured in the President’s Management Agenda (PMA) issued one year ago. […]

Dana Deasy, CIO of the Department of Defense, provided an update on the progress at the Joint Artificial Intelligence Center (JAIC) at GDIT Emerge today, including the initial project with a production version out to the service branches. […]

employee workforce federal worker-min

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and Science and Technology Directorate (S&T) published a five-year Broad Agency Announcement (BAA) looking to develop new mobile communications security standards. […]

SonicWall identified an uptick in cyberattacks with PDF origins this year, according to a report it published last week. The network security company identified over 74,000 new PDF-based attacks last year, “a number that has already surpassed in the first quarter of 2019 with more than 173,000 new variants detected.” In March alone, the company […]

Secretary of State Mike Pompeo said that a cyberattack could, “in certain circumstances, constitute an armed attack under Article 5 of the U.S.-Japan Security Treaty,” and that the United States would defend Japan in that circumstance. […]

Cyber Security Brainstorm

A new report from ACT-IAC (American Council for Technology-Industry Advisory Council) finds that zero-trust technologies are available and lend themselves to incremental installation, but need support from the mission side of the agency for effective implementation. […]

data sharing

The Millennium Challenge Corporation (MCC) is seeking to address data-sharing platform gaps that lead to inefficient dissemination of “knowledge” products, and updated a request for information (RFI) on a draft Statement of Work (SOW) for data management services from vendors. […]

The U.S. Department of the Interior (DoI) issued a solicitation today seeking a contractor to maintain, expand, and promote the production of National Archive Data and Culture (NADAC). […]

Federal Cloud Flag

With the increasing ubiquity of internet of things (IoT) devices and the vast expansion of the cyber attack surface that those devices create, National Security Agency (NSA) IoT Enterprise Functional Team Lead Arlene Santos is emphasizing the importance of the IoT Cybersecurity Improvement Act reintroduced in Congress last month as way to address the cybersecurity concerns posed by rapid IoT device growth. […]

Computers cloud connected-min

As part of the recent White House executive order on artificial intelligence (AI), Federal agencies will see a push to use AI to improve citizen experience, and an increased effort to catalog investments in AI, said Dr. Lynne Parker, assistant director for artificial intelligence at the White House Office of Science and Technology Policy (OSTP). […]

Ajit Pai, FCC Commisioner

Federal Communications Commission Chairman Ajit Pai said on April 17 he will vote to deny an application by China Mobile Ltd. to provide service in the U.S., citing security-related reasons similar to those that led Congress to bar the Federal government from doing business with China-based network equipment maker Huawei. […]

GAO government accountability office

The Government Accountability Office (GAO) on April 17 provided updates on specific recommendations regarding cybersecurity and IT acquisition for the General Services Administration (GSA) and Office of Management and Budget (OMB), respectively. […]

Computers cloud connected-min

Suppose that mid-way along the long, complex road to Federal IT modernization, an agency IT manager jotted down a wish-list for the most important big-picture elements of what the promised land should look like? […]

The U.S. Government Accountability Office (GAO) released an update on April 17 on the 13 priority recommendations identified in April 2018 for the Department of Justice (DOJ) with facial recognition software still being a key area for required action by the agency. […]

The Intelligence Advanced Research Projects Activity (IARPA) office released a draft solicitation for innovative solutions for automated broad-area search, monitoring, and analysis of anthropogenic activities – those related to human activity – within its Space-based Machine Automated Recognition Technique (SMART) program. […]

GDIT Emerge 2019

Have you ever wanted a front-row view of the entire sweep of the Federal information technology ecosystem? From the emerging technology labs of Silicon Valley, to the household-name companies that underpin modern tech, to the most innovative government leaders who are putting the latest emerging tech to work in their environments? […]

Boosting the use of cloud services may be the answer to expanding implementation of zero-trust models of cybersecurity across Federal agencies and departments, Education Department CISO Steven Hernandez said at an ACT-IAC meeting today. […]

employee hired workforce worker-min

Imagine if every truck or car that ever wrecked or broke down on the roadways were just left there, rusting away with pieces scattered, while you and every other driver had to try to navigate around them. […]

Categories