A Senate bill introduced on Aug. 1 not only would establish security requirements for Internet of Things (IoT) devices purchased by the government, but also let researchers look for critical security flaws through vulnerability disclosure policies. […]

In order for Federal agencies to make the best decisions about moving to the cloud, they have to optimize their data centers, according to IDC researchers. The Federal government is moving to a cloud-first approach when it comes to IT infrastructure, which makes CIOs reluctant to invest in a Data Center Infrastructure Management solution to optimize their data centers to meet Data Center Optimization Initiative requirements. […]

The Department of Defense is following the Federal push to move toward an enterprise structure by using Defense Enterprise Office Solution (DEOS), an effort by the Defense Information Systems Agency to acquire Software-as-a-Service at a DoD enterprise scale. DoD plans to move 4.5 million users to the cloud, using this approach. […]

Data analytics professionals in the Federal government advised new data analytics teams to earn credibility in their agencies by finding a real-life problem and fixing it. “Pick someone in the C-suite that has a solvable problem and go do it,” said Kevin Garrison, chief of analytics at the Department of Defense, at MeriTalk’s big data webinar. […]

The IEEE Standards Association recently announced that it will be teaming up with the National Institute of Standards and Technology (NIST) to develop principles for cloud interoperability or federation. […]

Christopher Painter made the case for cyber diplomacy after stepping down as cyber coordinator for the State Department in July. Painter wrote a blog post saying that cyber issues continue to grow, which increases the need for global discussions on cybersecurity. Yet Politico reported that the State Department is considering getting rid of its cybersecurity department. […]

The Government Accountability Office evaluated the advantages and disadvantages of the National Security Agency and Cyber Command’s dual-hat leadership system and found that the system causes tension between the two agencies due to competing interests. […]

CCX Meeting

Today, just 13 percent of Feds say they can deploy new systems as quickly as required. And, it’s no secret agencies are being pushed to make the move to cloud – whether it’s data center consolidation initiatives, flexible performance to meet constituents’ on-demand requests,  simply the desire to increase overall IT efficiency, or the demands of the current regulatory environment. So where do agencies start as they evaluate their cloud options?  Enter the Great Cloud Debate. […]

Through its series of summer camps and competitions, the Air Force Association’s CyberPatriot program is aiming to expand the cybersecurity workforce for both the public and private sector. “What they have learned is if they wait until someone is a college graduate, it’s too late, if they wait until they’re in college, it’s too late,” said CyberPatriot National Commissioner Bernie Skoch. […]

cloud committee

The best way for agencies to begin their transition to the cloud is to talk to agencies that have been through the same experience. “It’s always good to talk to people who have gone through it,” said Craig McCullough, vice president of Commvault Federal. […]

Incorporating automation into the U.S. electric grid can both improve recovery capabilities in the event of an outage and present new cybersecurity dangers, according to a recent National Academies of Sciences, Engineering, and Medicine report. […]

Lawmakers should ensure law enforcement agencies can gain lawful access to information to protect their citizens and uphold U.S. laws, but without putting companies and workers at a disadvantage, according to a report from the Information Technology and Innovation Foundation. […]

Cybersecurity considerations for both government and industry have to include leadership, supply chains, mobility, and other components in order to be effective, according to experts who spoke at PCM-G’s Mission First event. […]

Federal agencies that amass multitudes of data because of drone use have had to think about how to store and protect that data. Agencies that use drones are caught between following the regulations in place for aircraft and following the regulations for IT systems, since drones contain properties of both categories. […]

On Aug. 2, experts from the public and private sectors will discuss Federal big data management master strategies, the evolution of big data leadership, and the impact of big data on agency modernization efforts. […]

The House Homeland Security Committee on July 26 unanimously passed two bills to improve the government’s cybersecurity posture: the Cybersecurity and Infrastructure Security Agency Act of 2017 and the Cyber Vulnerability Disclosure Reporting Act. The Cybersecurity and Infrastructure Security Agency Act creates a new agency within the Department of Homeland Security (DHS) to deal with […]

cyber insurance

Despite the relatively new nature of cyber insurance policies, small businesses are finding value in their offerings, according to witnesses who testified before the House Small Business Committee on July 26. “It affords me the knowledge that if we were hacked, protective steps have been taken to address any potential damages to the company and my employees,”said Robert Luft, president of SureFire Innovations. […]

Congress should focus on providing Customs and Border Patrol (CBP) with technology to patrol the border and detect illegal smuggling, rather than building a physical barrier across the whole southern U.S. border, according to Rep. Will Hurd, R-Texas. […]

Federal leaders emphasized the importance of cybersecurity and partnerships with the private sector at the Aspen Security Forum on July 22. Secretary of Homeland Security John Kelly said he agrees with the decision of former DHS Secretary Jeh Johnson that made election systems critical infrastructure and told the states that DHS would offer help if […]

State and Federal representatives testified to the need for a first responder-only network and offered their support of FirstNet’s efforts during a recent Senate Commerce, Science, and Transportation Committee hearing. […]

IBM released its new mainframe, IBM z14, which offers encryption for 100 percent of user data and achieves the highest level of government security standards currently on the market. The mainframe will be made available in mid-September and IBM is working with the Federal government to integrate this technology into its IT strategies. […]

The Department of Justice announced on July 20 that it was recently able to take down dark website AlphaBay and its administrator. The action was in conjunction with Europol as well as law enforcement authorities in Thailand, the Netherlands, Lithuania, Canada, the United Kingdom, and France. […]

If Federal agencies invest upfront in technologies to track fraud and improper payments, the government could end up saving enough money to pay back some of the national debt or stave off sequestration, according to Rep. Gerry Connolly, D-Va. […]

BlackBerry announced the expansion of its public sector cybersecurity offerings to include SecuSUITE for Government, which provides end-to-end encryption of calls and texts and supports iOS, Android, and BlackBerry 10 smartphones and tablets. […]

CCX Meeting

To score a home run, you have to cover all the bases. But getting from start to finish is harder than it looks. For Federal agencies, hitting IT out of the park is even more difficult due to budget constraints, lengthy procurement processes, and staffing difficulties. And, as agencies continue to spend 79 percent of IT budgets – or $62 billion annually – on legacy systems, the window for innovation decreases every day. So how can agencies stay ahead of the curve? […]

The White House is celebrating Made in America Week, while many U.S.-based technology companies advocate for H-1B visas to sponsor foreign workers who engineer some of the nation’s most lucrative technology products. […]

Categories