The Pentagon's mobile plan includes device approvals that will involve some up-front costs. The expectation is those costs will be quickly offset by eliminating the inefficiency of the slow, stovepiped and outdated approaches that have characterized DoD mobility up until now.
On this week's Capital Impact show, Bloomberg Government analysts will examine the reasons for the shortage of skilled worker visas, and the differences between U.S. and European approaches to cybersecurity. May 2, 2013
Chase Garwood, the SBA acting CIO, said the agency is working with DHS and Justice to improve the security of its internal and external customer-facing systems. May 1, 2013
The Defense Advanced Research Projects Agency has been at the forefront of some of the most innovative technologies ever created — including the Internet. But as budgets tighten, the agency's director says she's trying to figure out how to deal with an increasingly complex threat environment as less money flows into the research and development pipeline.
News and buzz in the acquisition and IT communities that you may have missed this week.
The idea behind cyber threat intelligence is to understand more about the attack and the attacker than ever before by matching up patterns, anomalies and other characteristics of the bad guys. Energy, DoD, Commerce and DHS are all analyzing cyber attack data to develop this more complete picture.
An update to the Federal Information Security Management Act and the Cybersecurity Enhancement Act of 2013 passed through the House Tuesday night. The Cybersecurity Information Sharing and Protection Act also passed, but faces a veto threat because of concerns over data protection.
The federal cyber workforce is not facing an immediate retirement wave, but it will if agencies don't increase the number of younger workers.
Collaboration and a better way to measure risk emerge as the two main factors in developing a more integrated approach to protecting critical infrastructure systems and networks. At the first of four workshops, NIST got the lowdown from owners and operators as well as information sharing centers on what's working and what needs to be at the forefront as the framework is developed.
On this week's Capital Impact show, Bloomberg Government analysts discuss Fannie and Freddie underwriting practices, how much colleges and universities spend on lobbying, and how BRAC is changing the area around Fort Meade. March 28, 2013
An independent group's report offers ways for agencies to evolve to continuous monitoring and risk-based approaches to cybersecurity within the existing Federal Information Security Management Act, and proposes more cooperation between CIOs and agency inspectors general.
Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Officials aim to redefine operational series codes for civilian cybersecurity workers and offer more pay for additional expertise. The Air Force would like to create an elite cadre of civilian cyber warriors.
The agency in an email to contractors said information including social security numbers and bank account information were publicly assessable. GSA is offering credit monitoring services to those affected.
Cyber coordinator Michael Daniel released updated goals for TIC, HSPD-12 and continuous monitoring on Performance.gov. He said by adding new goals to the portal, performance improvement officers will pay more attention and influence how agencies meet the targets.