This month marks the first anniversary of President Trump signing his cyber executive order (EO), formally titled the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. […]

cyber workforce

John Bolton, President Trump’s national security adviser, may not be hunting for a replacement for Rob Joyce, the current White House cybersecurity coordinator, who previously announced he would leave his post and return to the National Security Agency later this month. […]

The Federal government isn’t known for its progressive approach to IT infrastructure, and agencies aren’t usually early tech adopters. Yet, agencies are increasingly deploying cutting-edge DevOps methodologies to achieve agility and reduce operating costs. […]

A new government-wide strategic plan on Category Management covering FY18-FY20 and released in late April aligns with the President’s Management Agenda and declares the Enterprise Infrastructure Solutions contracting vehicle one of its key IT components. […]

Malware-pushing criminals are no longer finding as much profit in email-based exploits, but the National Institute of Standards and Technology says cyber-crime perpetrators may find that easier lines of attack lie in infiltrating social media platforms. […]

Military cybersecurity officials said at MeriTalk’s Tenable GovEdge 2018 event on May 3 that they can focus more on taking the fight to adversaries if the private sector can continue to provide the military with strong network defense technologies. […]

A Federal CISO handbook is due out soon from the CISO Council, said Jeff Wagner, Acting Chief Information Security Officer at the Office of Personnel Management. The new guidance aims to cut down on technical language barriers and standardize compliance formatting across the Federal enterprise. […]

It’s no secret that Chinese companies are major suppliers to U.S. technology companies that serve the Federal government, and a report issued last month says the Chinese government is leveraging that manufacturing capability to create significant security risks across the U.S. Federal enterprise. […]

American hack
cybersecurity

A gathering of crows is called a murder. A bunch of kangaroos is called a mob. And a gathering of IGs is–no, not a nuisance–it’s called CIGIE–the Council of Inspectors General on Integrity and Efficiency. And, CIGIE’s annual Top Management and Performance Challenges–TPMC report–boiled down IG reports from 61 different agencies–and leads with IT and security management issues across the government. […]

Machine learning innovation is kicking into high gear. Investment in this field and data science increased 9.3 percent in 2016 to $2.4 billion, according to Gartner. On top of that, the Federal government is increasing its focus on machine learning, with the MGT Act, Technology Modernization Fund, and the President’s Management Agenda all supporting transformation efforts. […]

Conventional wisdom is that it takes a fairly long time to detect a cybersecurity breach. Typically, most research suggests, it takes two to three months, possibly longer. That may not be the case anymore, though, according to a recent report. […]

Bot-driven cyberattacks and other fast-spreading malware have been making some pretty big waves of late. The Mirai botnet, for example, launched several record-setting Distributed Denial-of-Service–DDoS–attacks starting in September 2016. […]

Last month, the Department of Homeland Security issued a rare public alert about a large-scale Russian cyber campaign targeting U.S. infrastructure. The news raised serious concerns about vulnerabilities in the nation’s power grid and other critical infrastructure assets.   […]

As every serious runner knows, preparing for a big race can be a daunting task; it takes time, patience, and determination to succeed.  Once the training schedule begins, the runner must be diligent with sticking to the task.  By neglecting even one workout, the runner can risk losing progress, and not finish the race. […]

Yogi Berra told us it’s like déjà vu all over again–and cyber stalkers let out a huge yawn at yesterday’s House Armed Services Committee hearing on cyber operations. This torturous exercise in reviewing technology security and public safety challenges associated with critical infrastructure was studded with the clichés and platitudes that set our nation up for a massive kinetic cyber attack. […]

Security is the great white whale of Federal IT–even as we make progress, it is just out of reach. Late last month, Zscaler announced it had prioritized rigorous security standards by achieving the Service Organization Control (SOC) 2, Type II Certification. […]

The Government Accountability Office–GAO–recently released a report on an artificial intelligence forum it held in Washington, D.C. last summer. It shows that government’s thinking about the ups and downs of thinking machines. Two highlights to make you think.  […]

The Department of Veterans Affairs (VA) will be under new management. The ouster of former secretary David Shulkin was a slow burn, not unlike the process to approve an Electronic Health Records (EHR) system that will satisfy the government’s cybersecurity and interoperability demands. […]

The new President’s Management Agenda (PMA) outlines 14 Cross-Agency Priority (CAP) goals to foster better government services. Goal No.1? IT Modernization. And the other 13 goals buttress and intersect across the board with that overarching directive to build more modern, secure, and resilient IT systems. […]

Cybersecurity

The Department of Homeland Security’s (DHS) rare public alert last week about a large-scale Russian cyber campaign targeting U.S. infrastructure raised a piercing alarm about vulnerabilities in the nation’s power grid, and underscored what officials have meant when talking about the need for a whole-of-government and whole-of-nation approach to cyber defense. Protecting against a major attack, managing the damage once one hits, and responding to an attack are beyond the reach of any one agency or sector, they argue; the job requires concerted efforts from the public and private sectors. […]

While Federal agencies race to migrate to the cloud, security concerns seem to multiply by the hour. This month alone, Russian hackers penetrated the U.S. power grid; cyber attackers got into the network of a petrochemical company in Saudi Arabia in hopes of triggering an explosion; and North Korean hackers apparently “blitzed” Turkish banks and government organizations to gather intel for a future heist. […]

Categories