Smarter Gov Tech, Stronger MerITocracy

In a previously announced move, the Pentagon elevated the U.S. Cyber Command to a full unified command. This reflects the universal role cyber operations–and potential cyber threats–have come to play across the range of military activities, and how relatively quickly virtual technologies have changed the game. […]

In a move that will help save the Federal government $695 million over the next 10 years, the Defense Information Systems Agency (DISA) is “reshaping and reorganizing [its] Computing Ecosystem.” The first part of the reorganization is shuttering the doors of its St. Louis data center. […]

As debate swirls around the Department of Defense’s (DoD) multibillion dollar Joint Enterprise Defense Infrastructure (JEDI) cloud acquisition, the department’s push toward commercial cloud services is continuing on other fronts. […]

White House
cyber workforce

The White House said on Thursday that it will create a new artificial intelligence (AI) advisory committee–dubbed the Select Committee on Artificial Intelligence–that will advise the White House on AI research and development efforts in government and industry. […]

John Bolton, President Trump’s national security adviser, may not be hunting for a replacement for Rob Joyce, the current White House cybersecurity coordinator, who previously announced he would leave his post and return to the National Security Agency later this month. […]

White House

This month marks the first anniversary for the American Technology Council (ATC), which was created by President Trump via Executive Order (EO) on May 1 of last year. […]

Federal government officials and a member of Congress influential in government IT spending debates said late last month that billions of additional savings look to be ripe for the picking through elimination of duplicative services, and that Congress is working on ways to beef up the pursuit of those savings. […]

A Federal Aviation Administration (FAA) official in charge of the agency’s unmanned aircraft systems (UAS) office told senators today that FAA is fast-tracking its efforts to launch a rulemaking that would establish remote identification requirements for drone aircraft. […]

A new government-wide strategic plan on Category Management covering FY18-FY20 and released in late April aligns with the President’s Management Agenda and declares the Enterprise Infrastructure Solutions contracting vehicle one of its key IT components. […]

Malware-pushing criminals are no longer finding as much profit in email-based exploits, but the National Institute of Standards and Technology says cyber-crime perpetrators may find that easier lines of attack lie in infiltrating social media platforms. […]

Military cybersecurity officials said at MeriTalk’s Tenable GovEdge 2018 event on May 3 that they can focus more on taking the fight to adversaries if the private sector can continue to provide the military with strong network defense technologies. […]

A Federal CISO handbook is due out soon from the CISO Council, said Jeff Wagner, Acting Chief Information Security Officer at the Office of Personnel Management. The new guidance aims to cut down on technical language barriers and standardize compliance formatting across the Federal enterprise. […]

It’s no secret that Chinese companies are major suppliers to U.S. technology companies that serve the Federal government, and a report issued last month says the Chinese government is leveraging that manufacturing capability to create significant security risks across the U.S. Federal enterprise. […]

cybersecurity

The Defense Information Systems Agency–DISA–has granted IBM’s SmartCloud for Government a 12-month Department of Defense Provisional Authorization for systems hosting data at Impact Level 5–IL5. The move makes IBM’s Infrastructure-as-a-Service–IaaS–the latest cloud service available to Federal agencies for the highest level of unclassified information. […]

You can hear the clatter from the White House as it hammers out the details of a long-awaited national cyber security strategy. But, the Department of Defense (DoD) cyber policy strategists are writing out advice to keep Federal agencies safe from hackers’ webs today. […]

Tenable announced that it recently discovered a critical remote code execution vulnerability in two Schneider Electric applications used in manufacturing, oil and gas, water, automation, and wind and solar power facilities. […]

Commerce Secretary Wilbur Ross emphasized on Tuesday that the Trump administration is prioritizing deployment of 5G wireless technology even as major service providers are restructuring their operations in pursuit of similar goals. […]

A gathering of crows is called a murder. A bunch of kangaroos is called a mob. And a gathering of IGs is–no, not a nuisance–it’s called CIGIE–the Council of Inspectors General on Integrity and Efficiency. And, CIGIE’s annual Top Management and Performance Challenges–TPMC report–boiled down IG reports from 61 different agencies–and leads with IT and security management issues across the government. […]

Categories