Smarter Gov Tech, Stronger MerITocracy
capitol washington dc senate house congress-min

In one of many budget hearings taking place on the Hill this week, the House Appropriations Subcommittee on Financial Services and General Government heard from Russell T. Vought, acting director of the Office of Management and Budget (OMB) regarding the agency’s FY2020 budget request. While the bulk of the hearing didn’t address IT issues, Vought did touch on IT spending, IT modernization, and the President’s Management Agenda (PMA). […]

A recent audit by the General Services Administration’s (GSA) Office of Inspector General found that GSA’s Federal Risk and Authorization Management Program (FedRAMP) Program Management Office (PMO) has not yet established an adequate structure to assist the Federal government with adoption of secure cloud services. […]

Robot

The Japanese seem to have robots that do it all. They’ve made bots that can pitch a baseball, play the violin, mimic a toddler, or even cook up some pancakes. But Japanese United Nations (U.N.) Ambassador Nobushige Takamizawa drew an ethical line in the country’s robotics development when he said today that Japan has not and will not develop fully automated weapons systems. […]

ransomware

Ransomware strain LockerGoga has struck two U.S.-based companies in recent days. On March 22, Hexion, a provider of thermoset resins, and Momentive, a provider of silicones and advanced materials, both announced they were the victims of a ransomware attack, which experts believe is the LockerGoga strain. […]

Norwich University Applied Research Institutes (NUARI) has been awarded $5.9 million by the Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T) to expand its Distributed Environment for Critical Infrastructure Decision-Making Exercises (DECIDE) cyber-training platform. […]

The Department of Homeland Security (DHS) issued an alert last week after it was discovered that as many as 750,000 medical heart devices contain critical cybersecurity vulnerabilities. […]

Missouri University of Science and Technology (S&T) has pioneered a graduate school program that emphasizes data science, cyber-physical, and cybersecurity research – particularly on the front of cloud computing – to a degree that has earned it Federal recognition. […]

DOJ Department of Justice
NIST

At the quarterly meeting of the National Institute of Standards and Technology’s (NIST) Information Security and Privacy Advisory Board, researchers said that NIST was working on a new effort to emphasize secure software development on its Cybersecurity Framework. […]

mobile security endpoint cloud mobility BYOD

The U.S. Marshals Service (USMS) is looking for the best ways to improve its employee’s work-life by improving mobile computing and to do that, they’re focusing more on thinking outside the box. […]

FBI
military healthcare, veterans healthcare

The Defense Health Agency (DHA), which enables the military to provide medical services to combatant commands during both peacetime and wartime, has migrated to the cloud. […]

Senate hearing Congressional-min

The Senate Commerce, Science, and Transportation Committee’s Manufacturing, Trade, and Consumer Protection Subcommittee has scheduled a hearing for March 26 at 2:30 p.m. EDT on data privacy issues impacting small businesses and “the unique challenges they face with laws designed for larger companies.” […]

A new analysis from Apptio, a maker of technology business management (TBM) software as a service applications, finds that Federal agencies were on average spending less than two percent of their IT budgets on cloud services in fiscal year 2018, lagging far behind a reported spend rate for the private sector. […]

data center

With the new Artificial Intelligence (AI) executive order and Federal data strategy on the horizon, MeriTalk connected with Rob Davies, Executive Vice President of Operations, ViON, to discuss how agencies can prepare their infrastructure to handle demands from AI, IoT, advanced analytics, blockchain, and more. […]

cloud computing concept -min

The question of the best way for transitioning to cloud infrastructures is a big one for Federal agencies. One approach to solve this issue is a slow, measured migration. Another approach is a more dramatic transformation in a shorter period that might be painful, but allows agencies to reap the benefits of cloud migration much sooner. The best approach for agencies to successfully transition depends on the agency itself, its mission, and what officials are looking to achieve. […]

Cybersecurity flag
data sharing

The Office of Inspector General (OIG) Export-Import Bank ((EXIM Bank) of the United States released KPMG’s independent audit report on EXIM Bank’s information security program for FY2018 on March 13. In the report, KPMG, a public accounting firm, provided 14 recommendations that “should strengthen…EXIM’s information security program.” […]

D.C. Metro is planning to hack cybersecurity systems over the next few months, but not to worry–they’re hacking their own 7000 Series railcars to determine whether missing cybersecurity measures in the railcar contract left Metro data exposed. […]

The government has been trying to apply artificial intelligence to combat the opioid crisis, with projects like real-time mapping of the signs of illegal drug use, and prescription monitoring programs to identify high rates of opioid prescriptions and incidents of “doctor shopping” for the drugs. […]

Labor

The Department of Labor (DOL) on March 13 announced creation of a Chief Data Officer (CDO) position in accordance with the OPEN Government Data Act, which includes directing the heads of each Federal agency to “designate a nonpolitical appointee employee in the agency as the CDO of the agency.” […]

Blockchain link
State Department
Congress Capitol Senate House

Sens. Ron Wyden, D-Ore., and Tom Cotton, R-Ark., asked the Senate Sergeant at Arms in a March 13 letter to disclose to each member of the Senate “the extent of the cyber threats faced by the U.S. Senate–and by extension, our democracy,” and said disclosure of that information was “imperative in order to help the U.S. Senate address important cyber-security needs.” […]

Categories