Dedicated readers of What’s Brewin’ may wonder why it has been quiet of late. Here’s the story.
The greatest professional pleasure any editor can have is to work with an exceptionally talented reporter. I’ve worked with many excellent reporters, but none more passionate, fearless or committed than Bob Brewin, the originator and driving force behind What’s Brewin.’ To borrow a marketing tagline from a defense contractor, Bob never forgot who he was working for. That is to say he never was happier than when he was taking on powerful interests on behalf of the powerless.
Bob was a brilliant reporter with a gift for slogging through jargon-laden government documents to find hidden gems—the stuff lesser reporters lack the patience for, but which was Bob’s stock in trade. FedBizOps never had a more committed reader. Bob could ferret out waste and inefficiency in the defense world more quickly and effectively than a team of inspectors general. He was not impressed with rank—a legacy of his days as a Marine infantryman in Vietnam—but if you earned his respect, you could find no better friend.
The Defense Information Systems Agency currently offers its military customers certified cloud computing services from three vendors and has another seven under assessment for compliance with governmentwide security standards, top agency officials told Nextgov.
FedRAMP reviews aim to speed the adoption of cloud deployments across government by allowing cloud services to be vetted once – at a particular security level – and then deployed by a multitude of agencies. Agencies must comply with FedRAMP as a matter of federal policy.
But as noted in a recent review from the Council of Inspectors General on Integrity and Efficiency, neither the FedRAMP program office nor the Joint Authorization Board -- made up of the chief information officers of General Services Administration and the departments of Defense and Homeland Security -- can force agencies to comply with FedRAMP.
The report identified 348 federal commercial cloud contracts with a value of $12 billion as of fiscal 2014. But it did not identify specific agencies that failed to meet certification requirements.
Mark S. Orndorff, the mission assurance executive for the Defense Information Systems Agency, said three commercial cloud services are currently available to DOD users: Autonomic Resources, CGI Federal and Amazon Web Services.
Assessments of FedRAMP-compliant offerings from providers...
VA now wants to acquire a new imaging system that works on the Digital Imaging and Communications in Medicine standard for distributing and viewing medical images, including X-rays and more advanced systems such as CT body scans and MRI brain scans.
Note: All the links in the RFI page are dead at the moment. VA, please fix.
Orbital Sciences Corp. tried to launch a mission to the International Space Station yesterday using rocket engines built four decades ago, only to see the rocket blow up seconds after liftoff from a Virginia launch site.
Or as Orbital’s executive vice president, told the Guardian after the crash, “The asset stopped, there was some, let’s say, disassembly of the first stage, after which it fell to Earth,” said Frank Culbertson, in a deadpan description of an explosion that could be seen for miles and terrified observers.
Lost in old Soviet smoke: hundreds of millions of dollars worth of equipment, ranging from “classified cryptographic” gear to school science experiments, which were destroyed in a giant fireball Tuesday evening after technicians detonated a self-destruct mechanism six seconds after launch because of a “catastrophic” equipment failure.
Oh well, we’re still ahead in the smartphone payment race.
PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors
This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks
This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.
From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models
The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.
Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.