Clark Campbell, the vice president for public sector for BDNA, argues that if agencies don’t address end of life technology, the next cyber attack could be much worse.
Dave Mihelcic, federal chief technology and strategy officer for Juniper Networks, discusses innovation, information assurance, security, integration and how his company can help agencies move to the cloud. July 11, 2017
John Chirhart, the federal technical director of Tenable, argues for a fundamental change in the way agencies approach cybersecurity for the long-term.
It seems like big-time cyber attacks are getting worse and more frequent. The federal government seems to have avoided the most recent ones. Vince Crisler, CEO of Dark Cubed, tells Federal Drive with Tom Temin how federal managers can keep their organizations safe.
The Office of Special Counsel urged the General Services Administration to follow recommendations and put stronger financial controls on the use of Acquisition Services Fund dollars.
A small group of senators says the Veterans Health Administration should have its own chief information officer, who would report to the department’s undersecretary for health and would oversee all management and procurement decisions related to the health administration’s IT systems. It’s one of a few specific recommendations from the VA Commission on Care that are beginning to appear in new pieces of legislation.
Near-weekly, worldwide cybersecurity threats underscore the importance of network, end-point, and application monitoring. Federal agencies have worked under a policy of continuous monitoring/continuous diagnostics and mitigation for a decade. But given the seemingly unending growth in attack vectors, the spread of internal infrastructure to commercial cloud providers, and the rise of insider threats – they’ve got to up the game into what might be called advanced cyber monitoring.
Ed Harper, the Food and Nutrition Service’s director of the Office of Program Integrity for Child Nutrition Programs, worked with the Presidential Innovation Fellows to create a new online application prototype for free and reduced lunches.
The Defense Department has started testing one potential technology to replace the Common Access Card. This one purports to identify users by the ways in which they manipulate their mouse and type on their keyboards.
The Senate Armed Services Committee’s version of the 2018 National Defense Authorization Act cuts funding for several software programs the panel sees as underperforming, and implements what congressional officials say are corrective measures to DoD’s IT buying habits.
The Office of Management and Budget is writing a new consolidated policy on identity management. The forthcoming guidance is designed to give agencies one place to view OMB’s collection of identity management policies and lessons learned over the past several years.
Repperio founder and CEO June Marshall and company president Behrad Mahdi, join host John Gilroy on this week’s Federal Tech Talk discuss how their company can help federal acquisition specialists do data driven market research. July 4, 2017
Two months after the Digital Accountability and Transparency Act implementation, the DATA Act is proving to not only be a source of financial accountability, but a beacon, platform, and self-help tool for managing government.
Eric Jeanmaire, the branch chief for the Verification IT Portfolio Modernization at USCIS in the Homeland Security Department, said moving to an agile approach to development delivered capabilities more quickly and more successfully.
Who is actually responsible for that cyber attack that hit your organization? Often it comes down to guess work. Few people have much faith in the accuracy of the attribution. So what to do? John Davis II, senior information scientist at the Rand Corporation and co-director for scalable computing and analysis, joined Federal Drive with Tom Temin with recommendations.