Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
End points – smart phones, tablets, notebook PCs, even desktop PCs – form employees’ entry points to networks, applications and data. The rise in remote working and teleworking has made end points particularly attractive to cyber hackers, especially using ransomware attacks delivered through phishing campaigns.
Read moreThe Defense Innovation Unit whittled its search for new or innovative cyber technologies from 20 options to six, testing two bleeding edge cyber tools to improve the security at the endpoints.
The cyber agency is rolling out shared tools for agencies to secure their employees’ mobile devices, applications and web browsing.
For an enterprise service provider like the Defense Information Systems Agency, mass telework means serving the needs of not only internal employees but external offices.
Within the DoD’s massive data repositories lie solutions to problems ranging from how best to counter cyber threats to optimizing talent management to averting equipment downtime to ensuring operational readiness. AI-guided data exploration leverages AI to find what really matters within these enormous datasets, at speed.
The hackers were likely mapping the unidentified agency’s network, but “no evidence is available to confirm successful data exfiltration or lateral movement during either incident,” CISA says.
In today’s Federal Newscast: Sen. Tommy Tuberville (R-Ala.) has lifted his abortion-driven hold on military promotions. Job satisfaction at the Homeland Security Department has increased. And GAO blames staffing shortages for the failure of federal agencies to battle cyber attacks.
A closer look shows that public clouds are not always less expensive than on-premise solutions and are not a panacea for controlling IT costs. This is especially the case with transactional systems, where the application is on-premise and the data is in the public cloud.
Across the country, crimes involving elder abuse and elder neglect routinely go unreported. But even when those cases are not immediately reported to police, there can often be clues in Medicare and Medicaid data. The Centers for Medicare and Medicaid Services (CMS) already looks for those signs in claims data. But a recent IG audit found a lot more cases that could have been reported to state and local authorities if CMS had done a more rigorous analysis. Curtis Roy is a regional inspector general with the Health and Human Services IG’s office. Richard Miller is an assistant regional inspector general. They talked with Federal News Network’s Jared Serbu about their findings, on the Federal Drive with Tom Temin.
In the hopes of boosting employee retention, the Office of Personnel Management launched a new platform for agencies to advertise openings in a cyber workforce rotation program.
The Department of Veterans Affairs is outlining plans to conduct a full review of its website, after discovering technical problems that may have delayed disability claims for more than 100,000 veterans.
The intelligence community’s “public-private talent exchange” will start with an initial cohort of IC officers doing rotational assignments at companies in the space sector.