recommended reading

author archives

Results 11-20 of 198

FDA Crowdsourcing its Way to Precision Medicine. But What About Security?

November 25, 2015 When it comes to achieving President Barack Obama’s Precision Medicine Initiative -- an effort to laser-target medical care based on patients' genetic make-up -- collaboration among researchers is key. So a team at the Food and Drug Administration is launching a crowdsourced platform to provide a digital environment for members...

New 'Playbook' Details What It's Like to Work with 18F

November 24, 2015 The General Services Administration’s in-house startup team has unveiled a new guide providing a glimpse into its process when working with federal agencies to build digital services. The recently launched 18F Delivery: Partnership Playbook includes eight comprehensive "plays" meant to make it easier for agencies to work alongside 18F when...

Watchdog: Critical Infrastructure Needs More Cyber Metrics

November 20, 2015 Although the majority of agencies responsible for U.S. critical infrastructure sectors acknowledge the cyber risk as "significant," most still lack metrics and data on the effort to mitigate this threat. That’s according to a Government Accountability Office report, released yesterday, which examined eight agencies responsible for 15 of the country's...

NIST Names App Challenge Winners

November 19, 2015 An app that provides researchers quick access to data about chemical combinations has snagged the grand prize in the National Institute of Standards and Technology’s first-ever app-development competition. Meru Lab Reference, created by Kris Reyes, provides users with access to a wide array of complex chemical species data, including an...

Why Aren't Terrorists Committing More Cyberattacks?

November 17, 2015 The fear of terrorist organizations flexing their cyber muscles by launching a debilitating cyberattack is far greater than the actual reality of the situation, said Tricia Bacon, former counterterrorism official for the State Department at an event Tuesday. On the cyber front, terrorists are still considered less of a threat...

Could a New Center Help the US in Global Supercomputing Rankings?

November 16, 2015 A biannual listing of the world's most powerful supercomputers placed a Chinese supercomputer in the top spot for the sixth consecutive year, but perhaps a newly opened center could soon help the U.S. claim victory. Energy Department’s Berkeley National Laboratory's new Shyh Wang Hall is expected to include the National...

User Feedback Key to USASpending.gov’s 2-Year Facelift

November 13, 2015 With two years to go before key deadlines under the Digital Accountability and Transparency Act mandate a wave of new requirements for agencies submitting spending data to USASpending.gov, the Treasury Department is planning to revamp the website that tracks federal dollars. Treasury launched an open beta version of the site...

Lawmakers Seek Health Care Breach Answers

November 11, 2015 As data breaches at health care organizations continue to spike, a bipartisan group of senators want to know what the Department of Health and Human Services is doing to curb this damaging practice. Four senators yesterday sent a letter to Andy Slavitt, acting administrator for the Centers for Medicare and...

Commerce Department Launches Data 'Startup'

November 10, 2015 The Commerce Department has launched a new internal "startup" tasked with harnessing the power of modern data technologies to boost access to the piles of information contained within the walls of its 12 bureaus. Commerce Secretary Penny Pritzker announced the first-ever Commerce Data Service on Monday. Ian Kalin, Commerce's chief...

NIST's 5 Steps to Block Unwanted Software on Agency Systems

November 6, 2015 The National Institute of Standards and Technology wants to help organizations keep out unwanted software through automatic application whitelisting. The agency released a guide in October to help organizations understand and implement this technology, which is meant to control what software is allowed on an organization’s network. The technology aims...