The evolution of cyber crime in West Africa could be leading toward a fully established underground market in the region, according to Trend Micro research published on Thursday. […]
Small businesses can struggle with the vagueness of “reasonable protection” requirements that Federal laws and regulations establish for personal data, according to experts who testified Wednesday at a House Small Business Committee hearing. […]
Microsoft on Monday announced the general availability of Power BI Pro and HD Insights data visualization tools and a preview of its Cognitive Insights on the Azure Government cloud. […]
Major innovations in blockchain are likely to happen this year with the help of Federal agencies, industry experts say, even though health care applications for the technology have yet to reach mass markets. […]
Amazon Web Services’ cloud computing solutions have been added to CTAC’s GSA IT 70 Federal Supply Schedule, according to a February CTAC announcement. […]
Veritas and Microsoft announced their partnership to help companies better manage their data in the cloud by using Veritas’ Enterprise Vault.cloud management and governance service on Microsoft Azure. […]
Current cyberattacks better fit the mold of a cyber Cold War, rather than a Pearl Harbor, according to witnesses testifying in front of the House Armed Services Committee. […]
Consumer Technology Association President Gary Shapiro, who spoke at the Department of Homeland Security Science and Technology Directorate’s EMERGE Wearable Technology showcase, said that the Federal government will have to play a role in regulating the use of autonomous vehicles. […]
Adm. Michael Rogers, head of the National Security Agency and United States Cyber Command, envisions that Cyber Command should contract private companies to build cyber weapons in the next five to 10 years. […]
A bill introduced in the House of Representatives would give the National Institute of Standards and Technology greater authority to influence the adoption and evaluation of its Cybersecurity Framework by Federal agencies. […]
Stopping insider threats relies more on addressing human problems than technological ones, according to Bill Evanina, national counterintelligence executive and director of the U.S. National Counterintelligence and Security Center. […]
People, not new systems, are the single most consistent impediment to improving cybersecurity practices, according to R.H. Powell, senior director of security services at Akamai Technologies. […]
Reports that White House staffers have resorted to using an encrypted messaging app that erases messages as soon as they’re read has raised significant concerns that the practice may violate the Presidential Records Act. […]
It may sound like a Hollywood thriller, but thanks to new capabilities developed by Hitachi Data Systems as part of its Visualization Suite, being able to tell the story of a crime that recently happened or is about to happen just got very real. […]
A recent update to the International Data Corporation’s (IDC) “Worldwide Semiannual Public Cloud Services Spending Guide” predicts that worldwide cloud spending will reach $122.5 billion in 2017 and $203.4 billion in 2020. […]
In a letter sent to the leadership of the House Oversight and Government Reform Committee, Rep. Ted Lieu, D-Calif., and fellow Democrats called for an investigation into the personal cybersecurity practices of President Donald Trump and his staff. […]
When government agencies face a network breach, having a planned response protocol in place can make all the difference, according to industry experts. “The first thing that they have to do is they have to really take a hard look at their incident response protocol,” said Rob Potter, vice president of public sector at Symantec. He […]
The Defense Department is likely within 18 months of introducing autonomous cybersecurity tools that will be capable of augmenting human analysts by predicting threats and dynamically isolating parts of the network that may come under attack, outgoing CIO Terry Halvorsen said. […]
The preponderance of legacy systems in the Federal government poses a major obstacle to improved agency cybersecurity practices, according to Gene Dodaro, Comptroller General of the United States and head of the Government Accountability Office. […]
The decennial census earned a place on the Government Accountability Office’s 2017 High Risk List, due to its information technology-oriented agenda, according to Robert Goldenkoff, director of strategic issues at GAO. […]
Jason Matheny, director of the Intelligence Advanced Research Projects Activity, discussed the role technology plays in assisting the intelligence and law enforcement communities, as well as ongoing IARPA research. […]
The government needs to help provide educational resources to address the shortage of qualified workers to fill U.S. cybersecurity positions, according to witnesses at a House Science, Space, and Technology committee hearing. […]
Gregory Reams, leader of the U.S. Forest Service’s Forest Inventory and Analysis program, said that the open data sets his office makes available are unlikely to suffer the same fate as the animal welfare documents that disappeared from the Department of Agriculture website. “It’s been supported for 80 years and used by a wide constituency,” Reams said at Esri’s FedGIS conference. […]
The Federal Aviation Administration has registered 690,000 unmanned aerial vehicles, or drones, since late 2015. This drone influx has created a new set of data management challenges, according to FAA officials. […]
The best cloud companies to work for all make an effort to create a culture of employee engagement and success. Forbes released a list of the top cloud companies to work for, including M-Files, Apprenda, Zerto, OutSystems, Mendix, and DocuSign. MeriTalk reached out to them in order to learn the secrets of the best workplaces. […]
The National Aeronautics and Space Administration’s Center for Climate Simulation processes reams of data that are as dense as music playlists containing 190,000 years’ worth of songs. […]
When it comes to automating information security processes, even small investments in specific areas of security can lead to big improvements, according to experts speaking in a MeriTalk webinar. […]
The latest draft of President Donald Trump’s long-awaited executive order on cybersecurity requires a plan for transitioning all Federal agencies to shared services for email, cloud computing, and cybersecurity, and directs senior officials to study the feasibility of transitioning agencies to one or more consolidated network architectures. […]
Agency chief information officers realize the need to convert from on-premise data centers to the cloud, but still find it challenging to convince agency heads that it’s a necessary step. David Bray, CIO of the Federal Communications Commission, said Feb. 8 at the Cloud Computing Caucus Advisory Group meeting, “If you are wedded to legacy systems you are trying to turn a battleship very, very slowly.” […]
Collaboration and a willingness to learn new practices are the best ways to address cybersecurity concerns surrounding cloud computing, according to IT leaders from across the country. Greg Urban, chief operations officer of Maryland, said that a strong core of talent makes a big difference when exploring cloud capabilities. […]