The White House is celebrating Made in America Week, while many U.S.-based technology companies advocate for H-1B visas to sponsor foreign workers who engineer some of the nation’s most lucrative technology products. […]

The State Department’s cyber coordinator will be stepping down at the end of this month, according to reports from Politico. Chris Painter has been creating a strategic framework for cybersecurity during peacetime and gaining support from other countries. […]

More than one-third of the Small Business Administration’s 120 circuits are overloaded. To resolve this issue, chief information officer Maria Roat plans to modernize SBA’s infrastructure by moving to a “pure Ethernet backbone.” She said Ethernet will help employees with Skype and virtual counseling, and will extend to all of the agency’s field offices. […]

CCX Meeting

The pressure is on for agencies to make the move to cloud – just 13 percent of Feds say they can deploy new systems as fast as required. However, agencies know cloud is here to stay.  When it comes down to it, Feds are optimistic – 70 percent say increasing their cloud adoption pace will improve IT’s ability to innovate. That said, flying through the cloud procurement process is no easy feat. Making the cloud move is proving to be more complex than expected – but with the right planning and strategic moves, Feds can ensure they undergo a surprise-free move. […]

The secret to the Small Business Administration’s success in going from cloud launch to receiving an authority to operate (ATO) in less than three months was to burn the bridge back to the old way of doing things and commit completely to cloud migration, according to SBA Deputy CIO Guy Cavallo and CTO Sanjay Gupta. […]

The Federal Acquisition Regulation, the guidelines dictating how Federal agencies procure goods and services, is not flexible enough to keep pace with modernizing agencies, according to Jennifer Hoover, DevOps program manager for the Transportation Security Administration. […]

Cloud helps organizations focus on the important parts of their mission, rather than wasting their time on maintenance and compliance, according to Peter Cutts, senior vice president of hybrid cloud platforms at Dell EMC. […]

In 2012, the Office of Management and Budget listed 14 cross-agency priority goals as part of the Government Performance and Results Modernization Act. One topic identified was continuous monitoring of Federal IT networks. The next year, the Department of Homeland Security (DHS) announced a $6 billion program to address this: the Continuous Diagnostics and Mitigation (CDM) program. […]

CCX Meeting

How do agencies tackle cloud adoption? Everyone has a different story but the challenges are similar across state and local government.   Learn how other states are navigating the challenges of modernizing IT and how these organizations have found success in adopting the cloud. […]

As the needs of Federal employees push agencies to move more and more services to the cloud, join MeriTalk and Government Acquisitions Inc. for the Federal Focus: The Cloud Generation event on July 12 at the Newseum in Washington, D.C., to discuss the best practices and results of Federal cloud migration. Rep. Gerry Connolly, D-Va., co-author of FITARA and IT reform advocate, will keynote the lunch session at the event. […]

Many states and localities don’t have the resources to upgrade and protect their election systems from malicious cyber intrusion, and the Federal government should work to provide them with those resources, according to a recent Brennan Center report on election cybersecurity. […]

Kaspersky Lab is willing to turn over its source code to the U.S. government to dispel rumors that the company has ties to the Russian Kremlin, CEO Eugene Kaspersky told the Associated Press on July 1. “If the United States needs, we can disclose the source code,” Kaspersky said. “Anything I can do to prove that we don’t behave maliciously, I will do it.” […]

voting election map united states federal country government

Some states refused to turn over voter data to the White House on June 30, saying that the data requested contains sensitive information and could be used for political purposes. President Donald Trump signed an executive order in May that established the Commission on Election Integrity, which investigates instances of potential voter fraud. The commission asked the states to turn over all publicly available voter data. […]

Reps. Anna Eshoo, D-Calif., and Susan Brooks, R-Ind., and Sens. Orrin Hatch, R-Utah, and Ed Markey, D-Mass., introduced legislation June 29 to combat cyber crime by mandating that the National Institute of Standards and Technology, the Federal Trade Commission, and the department of Homeland Security (DHS) establish baseline best practices for the private sector. […]

The cyberattack that spread across Europe on June 27 was declared not a ransomware attack after further observation by researchers. The “Not Petya” attack didn’t encrypt files on the infected computers. Instead, it wiped the entire drive, making it impossible to retrieve files if they weren’t backed up on another device. […]

The transparent reporting of spending data through Digital Accountability and Transparency Act (DATA) requirements will go a long way to increasing public trust in the government, according to legislators and agency officials who spoke at the DATA Summit on June 29. […]

The United States and Israel announced plans June 27 to cooperate on cybersecurity issues, including domestic and international cyber policy, critical infrastructure protection, research and development, and workforce development. […]

Barracuda Networks announced the release of Barracuda Sentinel, an artificial intelligence-based solution to the increasingly targeted spear phishing campaigns experienced by all sizes of government and industry. […]

Companies that paid the ransom to retrieve their data from the Petya ransomware attack have no way of receiving the encryption key. Although Symantec has verified the Ukrainian accounting service, MeDoc, as “patient zero” for the attack, the cybersecurity company hasn’t discovered who is behind the attack. The email account that the attack stemmed from has been shut down, so that companies that pay the ransom of $300 won’t receive the encryption key needed to return their data. […]

Categories