The cyberattack that spread across Europe on June 27 was declared not a ransomware attack after further observation by researchers. The “Not Petya” attack didn’t encrypt files on the infected computers. Instead, it wiped the entire drive, making it impossible to retrieve files if they weren’t backed up on another device. […]

The transparent reporting of spending data through Digital Accountability and Transparency Act (DATA) requirements will go a long way to increasing public trust in the government, according to legislators and agency officials who spoke at the DATA Summit on June 29. […]

The United States and Israel announced plans June 27 to cooperate on cybersecurity issues, including domestic and international cyber policy, critical infrastructure protection, research and development, and workforce development. […]

Barracuda Networks announced the release of Barracuda Sentinel, an artificial intelligence-based solution to the increasingly targeted spear phishing campaigns experienced by all sizes of government and industry. […]

Companies that paid the ransom to retrieve their data from the Petya ransomware attack have no way of receiving the encryption key. Although Symantec has verified the Ukrainian accounting service, MeDoc, as “patient zero” for the attack, the cybersecurity company hasn’t discovered who is behind the attack. The email account that the attack stemmed from has been shut down, so that companies that pay the ransom of $300 won’t receive the encryption key needed to return their data. […]

Technological innovation has a very low chance of creating the mass job displacement predicted by many experts, according to research recently released by the Information Technology and Innovation Foundation (ITIF). […]

As agencies navigate cloud, they continue to leverage and build upon lessons learned. And, it seems to be working: According to a recent MeriTalk study, 75% of Federal cloud decision-makers say their workforce is somewhat or very comfortable with moving its systems to the cloud.

But, how did they get there and what’s really the first step of a successful migration? Knowing your IT environment is important – but even more essential is ensuring you have a cloud-ready workforce. […]

Bernard Barton, chief information officer of the Library of Congress, is challenging American coders to bring the centuries-old information stored by the library into the digital era. The challenge, which will launch later this year, asks coders to submit ideas for modernizing the public’s access to the Library of Congress’ data. […]

Another cyberattack with links to the stolen cache of National Security Agency materials is spreading across Europe on June 27, targeting banks, businesses, and a Ukraine power company. Infections have been reported in Russia, Ukraine, Spain, France, the United Kingdom, and India. […]

The number of reported Internet crimes and the costs incurred by those crimes are on the rise, according to the FBI Internet Crime Complaint Center’s recently released 2016 Internet Threat Report. The “hottest” Internet crimes of 2016 were business email compromise, ransomware, tech support fraud, and extortion. […]

Cloud computing services can keep pace with the fast-moving nature of private sector workplaces, according to Conrad Unciano, systems engineering manager for CSRA. He said CSRA recently migrated four of its key applications using Amazon cloud services. […]

Both members of the private sector and state governments are struggling under the burden of inconsistent and overlapping Federal cybersecurity regulations, according to experts who spoke before the Senate Homeland Security and Government Affairs Committee. […]

Strategy in cyberspace should be treated like the strategy used in traditional military battle spaces, according to Ray Letteer, chief of the cyber division of the Command, Control, Communications, and Computers (C4) Department at Headquarters of the U.S. Marine Corps, who spoke at Tenable’s GovProtect17 on June 21. […]

The underreporting of cyber incidents is a chief issue across Federal agencies, according to Kevin Cox, Continuous Diagnostics and Mitigation program manager for the department of Homeland Security. However, when the CDM Federal dashboard launches in July, agencies will be able to view not only their own cybersecurity issues, but also those of their fellow agencies. […]

Rob Joyce

The Federal government needs to set standards for cybersecurity and hold the proper people accountable, technology executives that gathered at the White House on June 19 told Rob Joyce, cyber coordinator for the White House. […]

The cybersecurity executive order, signed by President Donald Trump, could enable a shift in culture that will help entire agencies gain the cybersecurity knowledge that they need to be successful in their missions, according to agency CIOs. […]

The Unisys 2017 Security Index found that public concern over Internet security has increased more than any other security concern since their 2014 survey. “Our biggest percentage increase was in viruses, malware, and hacking activities,” said Bill Searcy, Unisys vice president of global justice, law enforcement, and border security. […]

Federal IT executives are focused on the future.  And, as agencies consider modernization strategies and options, most agree that cloud will be a foundational component.   While cloud conversations have been ongoing for many years, widespread use of cloud models remains a challenge.  There is still confusion about choices, migration paths, and which cloud offerings are available for different types of workload.  Fortunately, the burgeoning relationship between government and industry partners helps agencies cut through this cloud confusion. […]

The personal details of nearly 200 million voters were left exposed online by data firm Deep Root Analytics, which was working on behalf of the Republican National Committee, according to UpGuard, which reported the exposure on June 19 and characterized it as “the largest known exposure of voter information in history.” […]

Eighteen technology company CEOs are expected to attend the White House Tech Summit on June 19 to talk about modernizing the government’s tech infrastructure and keeping its computers safe from cyberattacks. The technology leaders could benefit if the government moves to modernize with the help of their hardware, software, and cloud-computing services. […]

When moving to the cloud, government customers must think about the many moving parts that make up such a project including the resources they need to sustain their applications as well as the resources required to complete the actual migration. They also must consider the architecture, security policies, and model for operations and maintenance, as well as scope the size of the environment. […]

Over the past few years, the department of Energy’s Pacific Northwest National Laboratory has started using cloud computing services. Michael Giardinelli, a senior software engineer and technical team lead at PNNL, said the lab’s 16 counterparts across the nation have embarked on similar cloud journeys. “A lot of them are moving in same direction as us,” Giardinelli said. “One key thing is collaboration amongst labs, like when working through the power grid.” […]

Under tight budget restrictions and capital expenditure scrutiny, government agencies are finding it difficult to keep pace with mandates to modernize technology infrastructure. Technology Infrastructure as a Service (IaaS) offers a direct path to IT modernization, efficiency and control. This white paper details the driving forces behind the shift to IaaS as well as the benefits of moving to a consumption economics model for IT. It also details best practices, specific strategies and the five (5) key principles in contracting for IaaS as well as a glossary of IaaS related terms, so that government agencies can efficiently and effectively utilize what is fast becoming the preferred, proven method of contracting for and implementing IT capacity. […]

The Federal government currently lacks the empowered leadership necessary to address U.S. cyber vulnerabilities, according to former Federal experts testifying before the Senate Foreign Relations Committee. “For the entire apparatus, there currently isn’t an empowered, either an individual or an agency, to do what I think is necessary,” said Samantha Ravich, senior adviser for the Foundation for Defense of Democracies and former national security adviser for Vice President Dick Cheney. […]

Cloud infrastructure may be the safest place to store an agency’s most sensitive data, department of Justice officials said at an AWS Public Sector Summit. “I’d say it’s a pretty good place to put your crown jewels,” said Karl Mathias, chief information officer for the United States Marshals Service, adding that commercial clouds may end up being safer than an agency’s own data centers. […]

Categories