Smarter Gov Tech, Stronger MerITocracy
Congress Capitol Senate House
Google HQ

Google released their framework for privacy legislation, which highlights providing transparency, securing personal information, and giving people access to their personal information as key requirements of a data regulation framework. […]

quantum computer processor chip intel computing hardware

A new “strategic overview” document published by the White House’s National Science and Technology Council (NSTC) says the U.S. government’s efforts to advance quantum information science (QIS) will “focus on a science-first approach that aims to identify and solve Grand Challenges: problems whose solutions enable transformative scientific and industrial progress.” That focus, NSTC said, will […]

elections, voting, election security, midterms
Cloud United States Federal

The Office of Management and Budget today released a draft of its new Cloud Smart strategy, marking the first update to White House guidance on Federal agency cloud adoption since 2011. With the new draft strategy the administration has broadly highlighted three areas–security, procurement, and workforce–as the foundational areas of the strategy and where it feels that updated guidance is most necessary. […]

DOJ Department of Justice
hybrid cloud multi cloud computing in the cloud

As Federal agencies migrate applications to the cloud, data integration can be a major stumbling block that prevents them from reaping the benefits of cloud services. While agencies are putting more applications in cloud environments, often the underlying technologies connecting these applications are still on-premise. As a result, information technology teams must spend time provisioning and maintaining their middleware infrastructure to avoid performance bottlenecks. […]

General Services Administration GSA

The General Services Administration (GSA) today announced that it awarded a $2 million contract to HackerOne for the facilitation of GSA’s bug bounty programs. […]

Capital, House of Representatives, Congress, Senate

Rep. Suzan DelBene, D-Wash., has introduced a consumer data privacy bill that would require online service providers to provide “opt-in” rights to consumers whose “sensitive personal information or behavioral data” they collect, store, process, sell, or share with third parties. […]

White House

The National Cyber Strategy policy document released by the White House late Thursday tracks in tone and wording with the tough stance adopted in the Defense Department’s cyber strategy announced earlier this week–including its adoption of a more offensive-minded position than previous written policies–and appears to respond in tone to demands from across the political spectrum that the U.S. fashion policy that will do a better job in creating a deterrence effect against adversaries. […]

cloud computing

The Federal government is continuing its push to update the Trusted Internet Connections (TIC) initiative to provide “improved solutions for accessing cloud services while maintaining cybersecurity,” according to the latest progress updates to the President’s Management Agenda (PMA). […]

election voting
5G wireless infrastructure technology

As the FCC prepares to vote next week on an order that would make it easier for wireless service providers to deploy small wireless antennas and other infrastructure to speed the deployment of fifth-generation–or 5G–services, two of the agency’s five commissioners discussed the pros and cons of taking that course at an event organized by Politico. […]

cloud cyber modernization AI

The Office of Management and Budget recently released its Q3 FY 2018 progress update to the President’s Management Agenda’s cross-agency priority (CAP) goals, and for CAP goal No. 1, IT Modernization, it appears that there has been a notable progression on cloud adoption in the Federal government. […]

Cybersecurity cyber

Small drones have been a useful tool to the military for years, primarily as a way to provide on-the-spot surveillance. But as hardware and artificial intelligence guidance systems continue to improve, macro- and nano-drones are poised to begin playing a bigger role in contested areas as both friend and foe. […]

Navy seal
data
Cloud computing

Current and former Department of Defense (DoD) officials discussed the benefits of using cloud and modernizing their legacy equipment to help accomplish their mission. […]

Modernization
AI Quantum Computing

The Pentagon’s geospatial intelligence analysts, who have admitted in the past that they have more data than they can properly analyze, are turning to artificial intelligence (AI) to automate and refine how they sift through massive amounts of imagery from satellites and other sources. […]

cctv closed circuit surveillance camera video monitoring footage
Capital, House of Representatives, Congress, Senate

Sen. John Cornyn, R-Texas, today introduced the Advancing Cybersecurity Diagnostics and Mitigation Act in the Senate. The House version of the bill (HR 6443), sponsored by Rep. John Ratcliffe, R-Texas, passed the House earlier this month. […]

Kirstjen Nielsen DHS
Election security, voting, midterms 2018

Stacey Dixon, director of the Intelligence Advanced Research Projects Activity (IARPA), said today at an event organized by Defense One that some of the intelligence community’s more audacious research centers on using machines to predict the future–through more accurate forecasts of geopolitical events. Dixon also said IARPA research aims to translate neuroscience to neural networks, hoping that efforts to map the human brain can lead to massive strides in machine learning. […]

Retired Gen. William Bender, who was Air Force CIO from 2014 until 2017, said on Thursday that while the pace of IT modernization across the services may be somewhat uneven, the military is making progress toward its modernization goals. […]

Internet of Things IoT Data Architecture diagram

The National Institute of Standards and Technology today released a new draft publication that takes a deep dive into the issue of trust: how can we trust that the products creeping into every aspect of our day-to-day lives are secure, safe, respect user privacy, and are ultimately tools we can depend on? […]

Election security, voting, midterms 2018
Hurricane Florence

The Department of Homeland Security’s National Cybersecurity & Communications Integration Center (NCCIC) is warning users “to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence.” Alongside these recommendations, the Multi-State Information Sharing & Analysis Center (MS-ISAC) released a cyber intel advisory on Sept. 14, which notes an uptick in internet activity related to Florence. […]

Categories