Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The latest data on the Federal IT Dashboard shows agencies are spending almost 71 percent of their technology budgets on operations and maintenance and less than 21 percent on development, modernization and enhancements for systems.
This program will provide a progress report on secure mobility solutions in government.
Before the Obama administration left office in December, it left a series of reports for the incoming Trump administration.
Without a serious effort at automation, the many segments of the cybersecurity response and kill-chain threaten to overwhelm security operations and information security staffs.
This program will provide a progress report on emergency communications and preparedness..
Near-weekly, worldwide cybersecurity threats underscore the importance of network, end-point, and application monitoring. Federal agencies have worked under a policy of continuous monitoring/continuous diagnostics and mitigation for a decade. But given the seemingly unending growth in attack vectors, the spread of internal infrastructure to commercial cloud providers, and the rise of insider threats – they’ve got to up the game into what might be called advanced cyber monitoring.
There’s an acronym used by federal leaders in the business of preventing or responding to Chemical, Biological, Radiological, Nuclear and Explosive attacks: VUCA. It stands for “volatile, uncertain, complex and ambiguous,” it describes the CBRNE operational environment, and they agree that it’s only getting more apt.
Digital transformation is happening across the government. Citizens are driving the rate of change through their expectations. What we’ve seen over the past few years with the growth and acceptance of the cloud, mobility, application programming interfaces (APIs) and the ability to understand user behavior like never before through data analytics, those agencies which are taking advantage of the evolutions of technology are doing a better job meeting their customers’ needs.
In just over seven years, agencies have submitted more than 149,000 data sets to the data.gov portal. Of those, the Commerce and Interior departments account for more than 110,000 of them.
As the cybersecurity challenge has morphed into a multi-front battle – from the insider in the next cubicle to a distant but malevolent foreign power – chief information security officers, network operations and security operations center staffs have steadily acquired a variety of tools to counter the threats. Few federal agencies are operating with an abundance of resources, even for such a high priority activity as cybersecurity.
This program will provide a progress report on secure cloud computing in government.
The House recently passed the Modernizing Government Technology (MGT) Act. The Senate is now considering it and Congressman Will Hurd, the author of the bill, said recently he’s confident the upper chamber will move on the bill.
This program will provide a progress report on CDM in government.
Let’s start by asking a simple question: Where does your agency want to be from a technology perspective, from a citizen services perspective by 2020?