Smarter Gov Tech, Stronger MerITocracy

The Hide ‘N Seek (HNS) Internet of Things (IoT) botnet, which initially targeted home routers, IP cameras, and video recorders, has been expanded by cybercriminals to target two NoSQL database servers, making it a cross-platform botnet. […]

It’s the Monday after a 6-goal barnburner in the World Cup final, a torrential downpour trophy ceremony, and we’ve now entered the era of existential dread for the world’s soccer fans. Reality sets in. It’s four years until the world’s biggest sporting event comes back around. […]

Irv Dennis, chief financial officer at the Department of Housing and Urban Development (HUD), on Thursday described HUD’s plan to use the largest-awarded sum from the Technology Modernization Fund (TMF)–including timelines for rollout and repayment–in an appearance on Government Matters. […]

Adopting cloud isn’t a one-size-fits-all proposition for Federal agencies. Instead, agencies looking to modernize their enterprise IT are customizing their adoption approach to fit their agencies’ structure, according to government and industry executives leading a Capital Exchange webinar on July 12. […]

Using digital records instead of paper-based ones can save government agencies money and help them provide better service to their constituencies, said speakers during Government Technology’s “Going Paperless: How to Do It and What You Will Gain” webinar on July 11. […]

Amid mounting concern about attacks by foreign adversaries on the Department of Homeland Security’s supply chain, two House subcommittees met today to discuss that threat and legislation proposed by the White House–the Federal Information Technology Supply Chain Risk Management Improvement Act–that would respond to the problem. […]

Alexander Kott, chief scientist at the U.S. Army Research Laboratory, said Wednesday at the Defense Systems Summit that creating artificial intelligence (AI) and machine learning (ML) solutions for complex battlefield environments requires different prioritization than commercial solutions, and offered four tips for defense organizations looking to implement. […]

Department of Defense (DoD) Chief Information Officer Dana Deasy said today at the Defense Systems Summit that he has identified four “key strategic areas” that will work to support the National Defense Strategy (NDS). Those four areas – cloud, artificial intelligence, C3 (command, control, and communications), and cybersecurity – are organized not in order of importance, but rather “order of integration,” Deasy said, with each of the priorities flowing from the prior one. […]

At today’s TBM Council Public Sector Summit, three government leaders stressed the importance of evolving the Federal government’s Capital Planning and Investment Control (CPIC) process and the role Technology Business Management (TBM) can play in that evolution. […]

Paul Craft, director of operations at the Joint Force Headquarters Department of Defense Information Network (JFHQ-DoDIN), spoke today at the Defense Systems Summit about how his relatively new component of U.S. Cyber Command is now tasked with operating and securing the entirety of DoD’s sprawling IT network infrastructure and has undertaken a complete restructuring of network operations for all of DoD. […]

Even as Apple went public yesterday with a new mobile device operating system intended to close security loopholes that law enforcement agencies were using to access locked devices, one digital forensics firm said it found a workaround to bypass the new security features for a cost of about forty bucks. […]

Director of National Intelligence Dan Coats said Monday that the intelligence community (IC) will be prioritizing a comprehensive cyber posture, machine-augmented intelligence, and modern data management as “foundational priorities” in the coming years, following a year-long reexamination of the IC known as the IC2025 initiative. […]

An overwhelming majority–86 percent–of 150 Defense Department (DoD) IT managers surveyed by MeriTalk said that failing to modernize legacy DoD systems is putting U.S. national security in jeopardy, and a similar number (83 percent) are concerned about the potential of the U.S. falling behind adversaries like China and Russia in newer-technology arenas including cyberspace, artificial intelligence, and electronic warfare. […]

The Department of Homeland Security’s Science and Technology Directorate and the Transportation Security Administration announced the winners of their passenger screening algorithm challenge that solicited new automated detection algorithms to improve speed and accuracy of detecting “small threat objects” during airport passenger screening processes. […]

The White House isn’t doing enough to address in a public forum a range of artificial intelligence issues and needs to institute a public process to seek comments on AI-related issues, said a group of six industry groups and more than 80 individuals from academia and the private sector in a July 4 letter to the White House Office of Science and Technology Policy (OSTP). […]

The Department of Homeland Security (DHS) is piloting a new artificial intelligence (AI) initiative with Canada’s Department of National Defense that kicked off today and aims to provide first responders and paramedics with information to help make potential life-saving decisions in the field. […]

The potential of artificial intelligence opens up the abundant future of game-changing machine-based applications in science, medicine, national defense, business, and just about every other area. But getting there while maintaining the U.S. lead in AI research and development will hinge on two old-school constants of innovation: money and people. […]

A mobile device security platform funded in part by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been updated with a never-before-seen feature to help tackle one of the most persistent problems in Federal agency cybersecurity. […]

Amid growing fears of large-scale cyberattacks–ranging from attacks on infrastructure, to cyber espionage that threatens national security, to a “terabyte of death”–Congressional lawmakers are calling for a more clearly defined strategy for responding to such attacks. […]

Categories