diversity

The role that data plays in meeting the demands of the Biden administration’s agenda for enhanced diversity, equity, inclusion, and accessibility (DEIA) policies is substantial, but only part of the picture, Federal experts said during a Feb. 21 GovLoop webinar. […]

Dan Daly TSA

A Transportation Security Administration (TSA) official said this week that the agency is working on technology-related solutions to make its airport-based workforce more efficient and to reduce the severity of security-related bottlenecks that flyers face. […]

The use of different types of technical language by government officials and industry personnel continues to plague the government procurement process, said Soraya Correa, former chief procurement officer at the Department of Homeland Security (DHS), at the Feb. 22 Digital Transformation Summit hosted by ACT-IAC and MeriTalk. […]

TSA CIO, Yemi Oshinnaiye

The Transportation Security Administration (TSA) is in the process of creating positions for both a chief technology officer (CTO) and a chief data officer (CDO), a top TSA official shared today at the Digital Transformation Summit in Reston, Va., organized by MeriTalk and ACT-IAC. […]

CISA

Rep. Mark Green, R-Tenn., the newly installed chairman of the House Homeland Security Committee, said he wants to help the Cybersecurity and Infrastructure Security Agency (CISA) strengthen its role as an “information enabler,” but at the same time said he is wary of the agency taking more of a “regulatory approach” to its mission. […]

FEMA

Federal government tech veteran Charles Armstrong is joining the Federal Emergency Management Agency (FEMA) as the agency’s new chief information officer (CIO), according to a recent LinkedIn post. […]

A top official at the Cybersecurity and Infrastructure Security Agency (CISA) said that we can expect to see “much more” guidance from agency cyber gurus in the coming months on Cybersecurity Supply Chain Risk Management (C-SCRM). […]

CISA

Daniel Bardenstein, the Cybersecurity and Infrastructure Security Agency’s (CISA) Chief of Technology Strategy and Delivery, said on Jan. 18 he will be stepping down from his post at the cyber defense agency. […]

As open source tools and software are becoming a more integral part of the government’s technology base, a host of agencies are at work formulating strategies to take best advantage of that trend, according to Allan Friedman, senior advisor and strategist at the Cybersecurity and Infrastructure Security Agency (CISA) […]

DHS

A Department of Homeland Security (DHS) advisory board has urged the agency to leverage technology to improve customer experience (CX) – from updating security checkpoint tech at airports to publicly posting wait times for immigration applications. On Dec. 6, DHS’ Customer Experience and Service Delivery Subcommittee delivered a final report to Secretary Alejandro Mayorkas highlighting […]

CISA

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) co-chaired the second meeting of their Joint Ransomware Task Force (JRTF) on Dec. 14, with a CISA leader saying that the task force effort is yielding “unifying” effects in the fight against ransomware-driven cyber attacks. […]

CISA

Top officials at the Cybersecurity and Infrastructure Security Agency’s (CISA) Joint Cyber Defense Collaborative (JCDC) are “demystifying” how the Federal government maintains critical infrastructure security and resiliency by partnering and sharing information with organizations across the globe, panelists said at Splunk’s Dec. 14 Government Summit in Washington, D.C. […]

ICAM

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) plans to host a new tech challenge next year that will test industry on its ability to deliver secure, accurate, and easy-to-use remote identity validation technologies. […]

DHS
DHS
CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has added two new Common Vulnerabilities and Exposures (CVEs) listings to its already extensive website catalog of CVEs, the agency said in a Twitter posting on Nov.28. […]

ransomware
DHS

Christine Finnelle, until recently the chief technology officer (CTO) at the U.S. Marshals Service (USMS), has headed to the Department of Homeland Security (DHS) where she is now the new director of enterprise architecture. […]

supply chain risk management process automation

The Cybersecurity and Infrastructure Security Agency (CISA) along with the National Security Agency (NSA) and the Office of the Director of National Intelligence (ODNI) published the final part of the three-part series on securing supply chains on Nov. 17. […]

The Cybersecurity and Infrastructure Security Agency (CISA) announced on Nov. 22 the release of a new update on the agency’s Infrastructure Resilience Planning Framework (IRPF) which helps state, local, tribal, and territorial planners protect technological infrastructure. […]

CISA

Iranian nation-state threat actors breached a Federal agency’s network before deploying malware, including a credential harvester and a cryptocurrency miner, according to a joint advisory released on Nov. 16, by the Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA). […]

The Government Accountability Office (GAO) has sized up the U.S. Secret Service’s work thus far on migrating to a zero trust security footing, and found that the Department of Homeland Security (DHS) component still has plenty of work to do on that effort. […]

Red Hat 2022

Charged with serving as the Federal lifeline for millions of citizens who need immediate help in the face of life-threatening disasters, the Federal Emergency Management Agency (FEMA) is leaning heavily on cloud services to run its data management system more efficiently, securely, and collaboratively. […]

A Cybersecurity and Infrastructure Security Agency (CISA) official told attendees at the Nov. 9 Red Hat Government Symposium that the agency’s efforts to improve security threat hunting within Federal government networks relies on speeding threat data to end users who can best use it. […]

1 4 5 6 7 8 10

Categories