Author Archive

Jill R. Aitoro

CIO Briefing

Agencies turn to technology for help reducing payment errors

No single solution will address all risk of fraud or waste in federal programs, OMB official says.

IT Modernization

Effective technology in government depends on executive buy-in, leaders say

Enterprise architecture shifts IT strategy from the computer room to the boardroom.

Cybersecurity

Progress is slow on cybersecurity goals, GAO reports

A lack of clear roles and responsibilities has hindered advances on President Obama's strategy for safeguarding computer networks, officials tell watchdog.

CIO Briefing

More than half of major corporations report politically motivated cyberattacks

Nearly two-thirds of companies that operate the world's critical infrastructures say the attacks were somewhat to extremely effective.

News

Supreme Court hears arguments in NASA privacy case

Justices will decide whether agency's background checks violate contractors' rights.

Cybersecurity

Results of cyber drill will help shape final version of response plan

Government, industry participants test procedures in simulated attack as officials put finishing touches on strategy.

Cybersecurity Report

State Cybersecurity Budgets Declining

Federal agencies maintain a lot of personal information on their computer networks and systems, but it's actually state governments that are the "custodians of the most comprehensive collection of citizens' personally identifiable Information," according to the National Association of State Chief Information Officers. And yet, 79 percent of state cybersecurity chiefs report stagnant or cut budgets, despite an increase in internal and external threats.

Cybersecurity

Feds' third cybersecurity exercise to attack content and identities

Cyber Storm III will use known hacker attacks to hijack certificates that verify content is legitimate and e-mails are authentic.

IT Modernization

Slow development of radio standards frustrates first responders

Requirements are so complicated that agencies fail to specify elements that must be compliant, resulting in systems that have many proprietary parts that are not interoperable.

News

Senate panel tries again to push through data breach bill

Data Security and Breach Notification Act would require businesses and nonprofits to adopt security practices that protect stored information from unauthorized access.

CIO Briefing

HHS to use data analytics to uncover Medicare, Medicaid fraud

Software tools will weed out potential incidents of abuse by flagging suspicious activities and anomalies, including unusual patterns in billing and applications for health services, in systems that process requests.

Cybersecurity Report

TechAmerica: Just Do It

In hopes that Congress will get something of note accomplished before year's end, IT industry association TechAmerica released a statement on Friday encouraging the Senate to pass a vote on several popular cybersecurity reforms before breaking later this month.

News

IRS still reliant on Social Security numbers to identify taxpayers

Agency plans to eventually replace SSNs on notices with 2-D bar codes, officials tell the inspector general.

News

CBP wants system to detect ultralights smuggling drugs

Officials report an increase in the number of attempts to move narcotics into the United States using the small aircraft, which avoid radar detection by flying low.

Ideas

Cyber Pays, Commodities Don't

HP announced the latest in a string of acquisitions on Monday, with plans to buy security software company ArcSight for $1.5 billion in cash. In the last six months, the PC manufacturer has announced plans to acquire Fortify, 3Com, Palm and 3PAR, to name a few, giving it a larger footprint in networking, mobile computing and -- most notably -- security.

CIO Briefing

Defense lacks doctrine to guide it through cyberwarfare

Top priority for the Cyber Command is to document rules of engagement, GAO officials say.

Cybersecurity Report

Now That's Ironic

Oh the irony: According to a report released Thursday by the DHS inspector general, the very system used by the U.S. Computer Emergency Readiness Team to exchange and access mission-critical data about the security posture of civilian networks was vulnerable to attack.

Cybersecurity

Fed's cybersecurity watchdog found to have security issues

The U.S. Computer Emergency Readiness Team had 540 vulnerabilities that put its systems at risk, IG says.

News

DHS to develop single, searchable database of immigration records

System will help identify cases of fraud and assist with intelligence and law enforcement investigations.

Cybersecurity Report

iTunes Social Network Spammed

It didn't take very long for Apple's new iTunes social network for music fans, which launched on Sept. 1, to get targeted by spammers.