Smarter Gov Tech, Stronger MerITocracy

Last week, the National Institute of Standards and Technology (NIST) revealed the initial public draft of its Special Publication 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems. […]

Most Federal managers grasp the concept of automation, the use of technology to perform a process or procedure without human assistance. However, do they really understand the role of automation, and how it can be applied to accelerate delivery and management of IT resources and applications, especially in this era of multi-clouds? […]

The U.S. military has long laid claim to having the best-equipped, best-trained fighting force in the world, and to spending more on defense than the next eight top-spending nations combined. But when the battleground is cyberspace, does that claim hold up? […]

data management

It’s an old axiom: “you can’t manage what you can’t measure.” And nowhere is that axiom truer these days than with Federal IT investments. Federal executives need to better understand, manage, and show value from money spent on IT resources. […]

cybersecurity

It is imperative for Federal agencies to effectively utilize threat intelligence combined with the power and agility of the cloud to better defend their networks. But, today, agencies are lacking adequate situational awareness to give their IT and security teams more clarity about what is going on in their networked environments. So, what’s holding them back? […]

Cybersecurity

The Department of Homeland Security’s (DHS) rare public alert last week about a large-scale Russian cyber campaign targeting U.S. infrastructure raised a piercing alarm about vulnerabilities in the nation’s power grid, and underscored what officials have meant when talking about the need for a whole-of-government and whole-of-nation approach to cyber defense. Protecting against a major attack, managing the damage once one hits, and responding to an attack are beyond the reach of any one agency or sector, they argue; the job requires concerted efforts from the public and private sectors. […]

While Federal agencies race to migrate to the cloud, security concerns seem to multiply by the hour. This month alone, Russian hackers penetrated the U.S. power grid; cyber attackers got into the network of a petrochemical company in Saudi Arabia in hopes of triggering an explosion; and North Korean hackers apparently “blitzed” Turkish banks and government organizations to gather intel for a future heist. […]

funding

Opening day for the Nationals might be a week away, but four Beltway insiders have already knocked one out of the park. The latest omnibus spending bill, which passed through the Senate early Friday morning, includes $100 million for the MGT Act’s centralized revolving capital fund. President Trump signed the MGT Act into law late last year as an amendment to the National Defense Authorization Act. […]

The tactics of warfare aren’t what they used to be. In addition to asymmetric battlefield tactics that differ from conventional battles, they also can include cyber, social, economic, and psychological strategies that don’t necessarily involve physical combat or destruction–or even direct human involvement–and can’t be divined by tracking troop movements or fleet deployments. As a result, the signs of impending war aren’t what they used to be either. […]

Federal IT comes with some baggage–much of its data is trapped in legacy technologies.  Agencies can’t realistically pick everything up and move to more modern infrastructure.  So how do they bridge the gap?  MeriTalk’s latest report found that improving data sharing between new and legacy systems is the number one solution to accelerating Federal IT modernization.  The “Modernizing the Monolith” study explores why legacy systems are so persistent and outlines a path to modernizing with them, instead of in spite of them. […]

A recent study showing just how easy it is to hack into Internet of Things (IoT) devices–and to use that access to gain entrance to a larger network–focused on commercial products used in the home. However, it could serve as yet another wake-up call for the Department of Defense and other government agencies that are increasingly relying on IoT. […]

The Department of Homeland Security (DHS) has been working in unison with the Office of Management and Budget to assess the risk management posture of the Federal government. They’ve been using a combination of agency self-reporting and independent verification to evaluate each agency’s mitigation techniques as well as the nation’s overall security standing. DHS’ latest […]

Government IT leaders may feel a little punch drunk lately. Between new mandates, an understaffed workforce, and aging systems–they are getting hit from all angles. Indeed, Chad Sheridan, CIO for USDA’s Risk Management Agency kicked off his keynote at last Thursday’s Veritas Public Sector Vision Day in Washington, D.C. by quoting Mike Tyson: “Everybody has a plan until they get punched in the mouth.” […]

GSA

Do agencies have enough time to make a smooth transition to the new Enterprise Infrastructure Solutions (EIS) contract by spring of 2020 when the older telecom contract vehicles expire? […]

Another important piece of the emerging Federal IT modernization ecosystem is in place now that the General Services Administration (GSA) has given four companies the greenlight to start work on the first of five IT Modernization Centers of Excellence (CoEs). […]

The House subcommittees on Information Technology and Government Operations held a “State of Play” Federal IT Hearing Wednesday for the latest updates on ongoing modernization efforts, and the tone was resolute and unflinching. […]

Artificial intelligence (AI) deployments in the Federal government are already making government smarter, based on examples shared during the second of a three-part series on AI launched last month by the House Subcommittee on Information Technology. Federal agency leaders from the Defense Advanced Research Projects Agency (DARPA), the General Services Administration (GSA), National Science Foundation (NSF), and Department of Homeland Security (DHS) discussed how AI is being implemented to improve the mission of their agencies and what is required to ensure the technology continues to be viewed as a problem solver. […]

The Senate Subcommittee on Communications, Technology, Innovation, and the Internet took a deep dive look at the future of broadband in the United States during a hearing on Tuesday. “To make next-generation broadband a reality and position the United States so it can win the global race to 5G, we should modernize outdated rules that delay and add unnecessary costs to broadband infrastructure deployment,” said subcommittee Chairman Sen. Roger Wicker, R-Miss. […]

Health

The Department of Defense (DoD) and contractor Cerner are coming off an eight week break in the initial deployment of what’s planned to be a worldwide health care records system. The team stopped work to address glitches in system performance and contend with negative user feedback. But officials in charge of the deployment of the MHS Genesis system said the pause was planned as part of the rollout, initial complaints were expected, and DoD still expects to complete the $4.3 billion system by 2022. […]

Like King Louie in the Jungle Book–Artificial Intelligence has to learn like people. Machine learning’s surely a brilliant student, but it’s still a slow learner. Once trained to recognize patterns, analyze huge amount of data, or interpret speech, they can do the job at lightning speed, often better than humans can. But the training part of that equation can be a labor and programming-intensive task, because machines still learn like machines–one thing at a time, often only after repeated instruction. […]

Not all bots are bad. But in the wrong hands, botnets can be commanded to do some very nefarious things, like Distributed Denial of Service–DDoS–attacks to disrupt and bring down websites. There are also malware-based bots that are increasingly being used to steal data and personal information. […]

Even with the Data Center Optimization Initiative (DCOI) deadlines pushed out to 2020, Federal agencies face significant pressure to expedite cloud migrations and consolidate their compute environments in a secure and cost-effective manner. Now, with the passage of the Modernizing Government Technology (MGT) Act, agencies may need to demonstrate significant progress in this area to justify their MGT Act budget requests. […]

Last month the Congressional Subcommittee on Information Technology began a three-part series of hearings to break through the myths and the hype to gain a real understanding of Artificial Intelligence (AI) and the role it can play in the Federal government. […]

The Department of Defense (DoD) on Wednesday sketched out plans for a swift, multibillion dollar move to a comprehensive cloud infrastructure, while leaving a lot of the details to be filled in along the way. […]

The Defense Information Systems Agency (DISA) has completed the transition of the Secret Internet Protocol Router Network (SIPRNet) to a virtual network, which increases its bandwidth tenfold, while supporting plans to extend SIPRNet to the very edges of the network via the commercial cloud. […]

It appears that the improved reliability and security of cloud computing is attracting more law enforcement agencies. The U.S. Customs and Border Protection (CBP) is the latest agency looking to migrate applications to a commercial cloud provider. […]

Categories