Smarter Gov Tech, Stronger MerITocracy
cybersecurity
cybersecurity

While the Continuous Diagnostics and Mitigation (CDM) program is here to stay for Federal agencies, taking proper approaches to data classification, collection, and analysis are key components to optimizing the program’s aims, security experts said last week at MeriTalk’s Cyber Security Brainstorm event. […]

DHS Homeland Security
identity management-min

Federal agency approaches to identity management don’t have a single approach across the government, but vary to significant degrees with agencies’ mission focus, said LaChelle LeVan, Acting Director for Federal Identity, Credential and Access Management (ICAM) Program Office at the General Services Administration (GSA). […]

Cybersecurity flag

Embassy Nassau, the American embassy to the Bahamas, has IT issues that are largely a result of embassy understaffing, according to an August 5 report from the State Department’s Inspector General. […]

Russia hacking hack cyber-min

An August 5 alert issued by Microsoft’s Security Response Center is blowing the whistle on hacking efforts focused on three classes of internet of things (IoT) devices that Microsoft asserts are being attacked by the hacking group it identifies as “Strontium,” better known as the Russia-based cyber espionage group Fancy Bear. […]

The National Institute for Standards and Technology (NIST) released a draft interagency report to establish a core baseline guide for cybersecurity that manufacturers may adopt for Internet of Things (IoT) devices they produce. […]

workforce federal workers industry-min
data privacy, people, personal data, binary
Army DoD military Defense AI

An inspector general (IG) for the Department of Defense (DoD) found internal control weaknesses relating to contractors installing cybersecurity controls that protect networks and systems containing DoD controlled unclassified information (CUI). […]

Cybersecurity cyber

Most government agencies have met Federal mandates to establish cyber risk executives and establish policies to make risk-based decisions on cybersecurity, but many agencies still need to establish cyber risk strategies, conduct risk assessments, and address gaps in existing risk management policies, according to a Government Accountability Office (GAO) report released July 26. […]

IRS
jeanette manfra dhs nppd oc&c assistant secretary

Balancing cybersecurity with modernization – as well as strategies that organically create that balance – are critical as Federal agencies work toward modernizing their IT infrastructures, said Jeanette Manfra, assistant director for the Cybersecurity and Infrastructure Security Agency (CISA), today. […]

The $380 million of Federal funds currently allocated to election security is not sufficient, and additional Federal support will be needed to secure the 2020 election, according to a new report from four nonprofit organizations. […]

data sharing

The Environmental Protection Agency’s (EPA) Office of Inspector General has flagged cybersecurity and data management issues as top management challenges for the agency in FY2019 that need to be tackled. […]

Cloud city modernization
election security polling place

The inspector general for the National Railroad Passenger Corporation, better known as Amtrak, found cyber vulnerabilities in an audit, as noted in a summarized public version of the report released July 9. […]

Cyber tech provider Proofpoint said a recent security awareness audit of employees that undertake security training concludes that people are only hitting on the right answers 78 percent of the time. […]

Small businesses are more likely to lack resources to build robust cybersecurity capabilities, but Sens. Gary Peters, D-Mich., and Marco Rubio, R-Fla., are looking to address that challenge with their recently introduced Small Business Cybersecurity Assistance Act. […]

healthcare cyber-min

According to security researchers Chase Dardaman and Jason Wheeler, three security flaws in Zipato smart hubs can be used to unlock doors equipped with smart locks if the flaws are chained together. […]

Categories