Federal agencies 18F and the U.S. Digital Service (USDS) are desirable in theory but confusing and misdirected in practice, according to members and witnesses at the House Oversight Committee hearing on Friday.
The Social Security Administration—the agency that holds personal data on every American citizen, living or dead—is starting to look a lot like the Office of Personnel Management right before foreign hackers pulled off the largest data breach in government history. And that has lawmakers on Capitol Hill worried.
Politics and blame stand in the way of Federal IT modernization, according to comments made at the House Oversight Committee’s hearing on legacy IT systems. Congressmen said they were disappointed and baffled over the degree of outdated technology in Federal agencies, some in mission critical systems.
State-Federal collaboration is going to be essential in combating state and local cyber threats, according to witnesses at a cybersecurity congressional hearing. “States have constantly ranked their cyber capabilities among the lowest capabilities,” said Rep. Dan Donovan, R-N.Y. “What is preventing us from reaching an appropriate level of cybersecurity?”
Ransomware attacks, which the FBI estimated could cost the United States $1 billion this year, have “become a real plague on the Internet,” according to Sen. Sheldon Whitehouse, D-R.I. As these attacks are becoming more sophisticated and destructive, the Senate Committee on the Judiciary addressed whether law enforcement has the right tools to foil them.
NASA’s progress meeting the requirements of FITARA has been anything but out of this world. Members of the House Oversight and Government Reform Committee voiced disappointment at the mediocre progress made by most agency chief information officers, but NASA, arguably the most high-tech of all Federal agencies, was the only one to receive an F.
The sun could pose the largest digital security risk to U.S. critical infrastructure, according to witnesses at a House Oversight and Management Efficiency Subcommittee. “All critical infrastructure sectors are at risk from EMP [electromagnetic pulse],” said Brandon Wales at DHS. […]
Applicants for Federal security clearances may want to double check their Twitter feeds, as agencies could soon be moving forward with investigations into applicants’ social media accounts. The biggest obstacle to these investigations, however, is not privacy concerns, but rather data security.
The General Services Administration has announced the establishment of a third service branch, known as the Technology Transformation Service, that will be centered around GSA’s 18F digital service organization and will actively provide technology services to other government agencies.
There are wide discrepancies in satisfaction among Federal employees at various agencies, and Congress wants to know why. “We don’t have a culture of performance recognition in government,” Max Stier, president and CEO of the Partnership for Public Service, told the Committee on Oversight and Government Reform Hearing.
Dave Powner, director of IT issues at the Government Accountability Office, profiled the upcoming agency scorecard on FITARA and discussed the Federal government’s continuing difficulties with data center consolidation and legacy IT modernization.
Internal Revenue Service cybersecurity is woefully inadequate, and Congress is to blame, according to Sen. Ron Wyden, D-Ore. “Congress has sat back and watched while criminals have come in and preyed on taxpayers,” Wyden said at a Senate Finance Committee hearing.
The General Services Administration is pushing Congress to get behind a plan to establish a third service branch, known as the Technology Transformation Service, that would be centered around GSA’s 18F digital service organization and would actively help manage the $3.1 billion IT modernization fund proposed by the White House, MeriTalk has learned.
Cyber Command’s influence may not be as expansive as some think, according to its commander, Adm. Michael Rogers. “The Department of Defense is not resourced, nor is it tasked with defending every single computer structure in the U.S.,” he said.
The Federal government is looking for ways to put the hammer down on health care data blockers and data hackers. As voluntary compliance isn’t working, Karen DeSalvo, National Coordinator of Health Information Technology, told a congressional hearing that she has called for funding to “put some teeth around” going after data blockers. […]
Skilled workforce retention is a major problem for the Department of Defense’s IT issues, according to DOD CIO Terry Halvorsen, and salaries are partly to blame.
The fledgling cyber insurance industry may hold the key to improving cybersecurity practices across the nation, according to a panel of experts who testified Tuesday before a House subcommittee. “The expansion of cyber risks and the growth of the cyber insurance market are a tremendous opportunity for the insurance sector to lead in the development […]
HealthCare.gov had a rocky rollout, but future Federal tech projects could learn a lot from its trials and successes, according to Erin Bliss at the HHS Office of Inspector General. She testified in front of the Senate Finance Committee alongside Seto Bagdoyan, the director of forensic audits at GAO.
Department of Homeland Security Secretary Jeh Johnson told a Senate committee that the agency plans to use the final months of the Obama administration and the fiscal 2017 budget request to kick-start and expand a new operational focus on data and cybersecurity.
FBI Director James Comey endured tough questioning by Rep. Darrell Issa, R-Calif., on whether the FBI had pursued every alternative to accessing the San Bernardino shooter’s phone before going to Apple, which has challenged a Federal court order that would force the company to unlock the phone.
In a national security hearing on worldwide threats, FBI Director James Comey defended the FBI’s demands that Apple provide access to the phone of San Bernardino shooter Syed Rizwan Farook.
Encryption was a hot issue this week. FBI Director James Comey told the Senate Intelligence Committee about the struggle of both counter-terrorism and law enforcement efforts in accessing information on encrypted devices, such as cellphones. And Reps. Ted Lieu, D-Calif., and Blake Farenthold, R-Texas, introduced the ENCRYPT Act as a means of combating the push for decryption.
Members of the House of Representatives Oversight and Government Reform Committee questioned why Danny Harris, the department’s chief information officer since 2008, was pursuing outside work while the agency has repeatedly received low cybersecurity grades from auditors.
The Veterans Benefits Administration is falling short in the way it is managing the progress of its Veteran’s Benefits Management System (VBMS), a system that was responsible for processing $63 billion in claims in 2014, Valerie Melvin, director of information technology at the Government Accountability Office, told the House Committee on Veterans’ Affairs.
Lawmakers this week will begin what could be a long debate over encryption and the role of technology companies, with people on all sides of the debate discussing the law enforcement and privacy implications of the controversial issue.
Archaic rules are holding the Senate back from making better use of digital communication technologies, write Sens. Cory Booker and Claire McCaskill, in a letter to the Senate Rules and Administration Committee.