Smarter Gov Tech, Stronger MerITocracy

Lawmakers from both sides of the aisle and both houses of Congress joined together on Thursday to reintroduce the Help Americans Never Get Unwanted Phone calls, or HANGUP Act. […]

quantum computing chip ai -min

Officials from the intelligence community on Thursday discussed the importance of using artificial intelligence to process and analyze the large amount of collected data by agencies, thus freeing analysts to shift their efforts toward looking into anomalies identified by AI. […]

5G Broadband rural broadband FCC-min
Machine learning AI-min

IT security technology provider Webroot said in a recently issued threat report document that the United States in 2018 led the rest of the world by a wide margin in hosting what the firm classifies as “high-risk URLs.” […]

Credit rating agency Moody’s said in a report issued today that it considers banks, securities firms, financial market infrastructure, and hospitals at “high risk,” from a ratings perspective, due to their exposure to the impacts of cyberattacks. […]

Cybersecurity flag

The White House’s new National Strategy for Aviation Security calls attention to a rising concern in aviation safety: the potential for cyberattacks on aircraft, a prospect that might just be as scary as it sounds. […]

Pentagon Military Defense DoD

Senior Defense Department officials told House members on Tuesday they are taking additional steps to boost cybersecurity workforce ranks at the Pentagon through means including the Cyber Excepted Service (CES) personnel system authorized in 2016 that allows DoD to expedite and simplify recruiting and hiring for civilian cyber professionals. […]

DOJ Department of Justice
DoD Pentagon Military

As the first chief data officer of the Department of Defense (DoD), Michael Conlin described the challenges of approaching a vast mountain of data from numerous systems at the Pentagon, and making it actionable information for the department. […]

elections, voting, election security, midterms

While much of the country was focused today on the testimony of Michael Cohen–President Trump’s former lawyer–before the House Committee on Oversight and Reform, elsewhere on the Hill the House Committee on Appropriations Financial Services and General Government Subcommittee was hearing testimony on election security. […]

cloud computing concept -min
Phone mobile security protection

With growing interest in cloud, mobility, and zero-trust technology, industry leaders in the identity credential access and management (ICAM) space are seeing a divergence between the existing policy of Common Access Card (CAC) and personal identity verification (PIV) cards, and new technology. […]

Most private and public sector CIOs have, are, or will be increasing their spending on cybersecurity and automation software deployments, according to a survey released today by Grant Thornton and the TBM Council. […]

capitol washington dc senate house congress-min

Privacy was the topic du jour on the Hill today. In its first hearing in the new Congress, the House Committee on Energy and Commerce Subcommittee on Consumer Protection and Commerce heard testimony from privacy rights activists and technology industry groups on how to protect consumer privacy in the era of big data. All witnesses before the Subcommittee agreed that the Federal government needs to enact Federal data privacy legislation, though witnesses disagreed on what exactly the legislation should cover. […]

Computers cloud connected-min

The move by government organizations to public cloud infrastructure is often motivated by a desire to provide better services to citizens, but an academic piece warns about the need to maintain public access to open data in the cloud. […]

Palo Alto Networks’ Unit 42 researchers announced on Friday that they have identified a spear phishing campaign from November 2018 that is targeting U.S. national security think tanks and academic institutions. Research indicates that the “threat actor might have interests in gathering intelligence related to not only North Korea, but possibly wider in the Northeast Asia region.” […]

hybrid cloud multi cloud computing in the cloud

As Federal technology managers increasingly operate in a hybrid, multi-cloud world, having a holistic view of their agency’s application landscape and architecture will help in mapping the right workload to the right type of cloud deployment. […]

On Thursday, the U.S. government released its Fourth U.S. Action Plan for Open Government that will work to making Federal government data more accessible, ensuring the grant-making process is more accountable, and Federally funded scientific research is more accessible. […]

The Cybersecurity and Infrastructure Security Agency (CISA) is seeking feedback on proposed updates to the National Emergency Communications Plan (NECP) after being informed from 2018 baseline assessment results. […]

chip hack cybersecurity cyber

President Trump in Twitter postings this morning called for the rollout of 5G wireless services in the U.S., and took it one “G” further by saying he’d also like to see deployment of “6G” technology – an idea that is still largely hypothetical. […]

White House

The White House on Wednesday issued its new National Strategy for Aviation Security (NSAS) which calls for greater efforts to protect the U.S. “Aviation Ecosystem” from a range of threats including those posed by cyberattacks and unmanned aerial systems (UAS). […]

Military AI DoD Defense
VA, Veterans Affairs

With the redesign of the VA.gov website for the Department of Veterans Affairs, the agency has made progress in providing a better customer experience. Now, alongside partners at the U.S. Digital Service (USDS), the agency is looking toward other areas to improve across the department, said officials from VA and USDS today. […]

Pentagon Military Defense DoD

The Department of Defense’s Artificial Intelligence Strategy puts the DoD on more of a fast track toward developing and employing AI and machine learning to support, as the strategy’s preface states, “a force fit for our time.” The strategy outlines an accelerated, collaborative approach with industry, academia, and allies toward new technologies that will “transform […]

Cybersecurity cyber

Cybersecurity technologies provider Symantec reported that ransomware activity fell by 20 percent in 2018 on a year-over-year basis, but that the focus of attacks shifted sharply toward enterprises and away from consumers last year. […]

Categories