Smarter Gov Tech, Stronger MerITocracy

Cloud helps organizations focus on the important parts of their mission, rather than wasting their time on maintenance and compliance, according to Peter Cutts, senior vice president of hybrid cloud platforms at Dell EMC. […]

In 2012, the Office of Management and Budget listed 14 cross-agency priority goals as part of the Government Performance and Results Modernization Act. One topic identified was continuous monitoring of Federal IT networks. The next year, the Department of Homeland Security (DHS) announced a $6 billion program to address this: the Continuous Diagnostics and Mitigation (CDM) program. […]

CCX Meeting

How do agencies tackle cloud adoption? Everyone has a different story but the challenges are similar across state and local government.   Learn how other states are navigating the challenges of modernizing IT and how these organizations have found success in adopting the cloud. […]

As the needs of Federal employees push agencies to move more and more services to the cloud, join MeriTalk and Government Acquisitions Inc. for the Federal Focus: The Cloud Generation event on July 12 at the Newseum in Washington, D.C., to discuss the best practices and results of Federal cloud migration. Rep. Gerry Connolly, D-Va., co-author of FITARA and IT reform advocate, will keynote the lunch session at the event. […]

Many states and localities don’t have the resources to upgrade and protect their election systems from malicious cyber intrusion, and the Federal government should work to provide them with those resources, according to a recent Brennan Center report on election cybersecurity. […]

Kaspersky Lab is willing to turn over its source code to the U.S. government to dispel rumors that the company has ties to the Russian Kremlin, CEO Eugene Kaspersky told the Associated Press on July 1. “If the United States needs, we can disclose the source code,” Kaspersky said. “Anything I can do to prove that we don’t behave maliciously, I will do it.” […]

voting election map united states federal country government

Some states refused to turn over voter data to the White House on June 30, saying that the data requested contains sensitive information and could be used for political purposes. President Donald Trump signed an executive order in May that established the Commission on Election Integrity, which investigates instances of potential voter fraud. The commission asked the states to turn over all publicly available voter data. […]

Reps. Anna Eshoo, D-Calif., and Susan Brooks, R-Ind., and Sens. Orrin Hatch, R-Utah, and Ed Markey, D-Mass., introduced legislation June 29 to combat cyber crime by mandating that the National Institute of Standards and Technology, the Federal Trade Commission, and the department of Homeland Security (DHS) establish baseline best practices for the private sector. […]

The cyberattack that spread across Europe on June 27 was declared not a ransomware attack after further observation by researchers. The “Not Petya” attack didn’t encrypt files on the infected computers. Instead, it wiped the entire drive, making it impossible to retrieve files if they weren’t backed up on another device. […]

The transparent reporting of spending data through Digital Accountability and Transparency Act (DATA) requirements will go a long way to increasing public trust in the government, according to legislators and agency officials who spoke at the DATA Summit on June 29. […]

The United States and Israel announced plans June 27 to cooperate on cybersecurity issues, including domestic and international cyber policy, critical infrastructure protection, research and development, and workforce development. […]

Barracuda Networks announced the release of Barracuda Sentinel, an artificial intelligence-based solution to the increasingly targeted spear phishing campaigns experienced by all sizes of government and industry. […]

Companies that paid the ransom to retrieve their data from the Petya ransomware attack have no way of receiving the encryption key. Although Symantec has verified the Ukrainian accounting service, MeDoc, as “patient zero” for the attack, the cybersecurity company hasn’t discovered who is behind the attack. The email account that the attack stemmed from has been shut down, so that companies that pay the ransom of $300 won’t receive the encryption key needed to return their data. […]

Technological innovation has a very low chance of creating the mass job displacement predicted by many experts, according to research recently released by the Information Technology and Innovation Foundation (ITIF). […]

As agencies navigate cloud, they continue to leverage and build upon lessons learned. And, it seems to be working: According to a recent MeriTalk study, 75% of Federal cloud decision-makers say their workforce is somewhat or very comfortable with moving its systems to the cloud.

But, how did they get there and what’s really the first step of a successful migration? Knowing your IT environment is important – but even more essential is ensuring you have a cloud-ready workforce. […]

Bernard Barton, chief information officer of the Library of Congress, is challenging American coders to bring the centuries-old information stored by the library into the digital era. The challenge, which will launch later this year, asks coders to submit ideas for modernizing the public’s access to the Library of Congress’ data. […]

Another cyberattack with links to the stolen cache of National Security Agency materials is spreading across Europe on June 27, targeting banks, businesses, and a Ukraine power company. Infections have been reported in Russia, Ukraine, Spain, France, the United Kingdom, and India. […]

The number of reported Internet crimes and the costs incurred by those crimes are on the rise, according to the FBI Internet Crime Complaint Center’s recently released 2016 Internet Threat Report. The “hottest” Internet crimes of 2016 were business email compromise, ransomware, tech support fraud, and extortion. […]

Cloud computing services can keep pace with the fast-moving nature of private sector workplaces, according to Conrad Unciano, systems engineering manager for CSRA. He said CSRA recently migrated four of its key applications using Amazon cloud services. […]

Both members of the private sector and state governments are struggling under the burden of inconsistent and overlapping Federal cybersecurity regulations, according to experts who spoke before the Senate Homeland Security and Government Affairs Committee. […]

Strategy in cyberspace should be treated like the strategy used in traditional military battle spaces, according to Ray Letteer, chief of the cyber division of the Command, Control, Communications, and Computers (C4) Department at Headquarters of the U.S. Marine Corps, who spoke at Tenable’s GovProtect17 on June 21. […]

The underreporting of cyber incidents is a chief issue across Federal agencies, according to Kevin Cox, Continuous Diagnostics and Mitigation program manager for the department of Homeland Security. However, when the CDM Federal dashboard launches in July, agencies will be able to view not only their own cybersecurity issues, but also those of their fellow agencies. […]

Rob Joyce

The Federal government needs to set standards for cybersecurity and hold the proper people accountable, technology executives that gathered at the White House on June 19 told Rob Joyce, cyber coordinator for the White House. […]

Categories