recommended reading

author archives

Results 671-680 of 904

New Counterintelligence Strategy: Focus on Cyber

November 19, 2015 A new national counterintelligence strategy aims to learn from the recent Office of Personnel Management hack, attributed to state-backed Chinese actors, which compromised the personal information of 22 million current, past and future federal employees and contractors. The 2016 strategy, published this week, broadly outlines a plan for detecting, mitigating...

Lawmakers Worry Malicious Hackers Could Take Control of Your Car

November 19, 2015 New car models, equipped with technology such as lane-changing alerts or blind-spot and collision warning systems, often rely on a wireless network quietly collecting data on drivers. Some auto manufacturers argue that this data -- geo-location, driving behavior, temperature preferences -- helps their driving software learn, adapting to the car...

Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government

November 18, 2015 After a 30-day, governmentwide "sprint" this summer to shore up federal agencies' cybersecurity posture, the federal chief information officer is turning to broader challenges, such as recruiting technology talent, he said on Tuesday. During a keynote at a FedScoop conference in Washington, D.C., Tony Scott outlined his IT priorities for...

from govexec

The Informers

November 17, 2015 One Thursday in mid-January, hundreds of thousands of Twitter users noticed a strange message written in Cyrillic script pass through their feeds. It was an untranslated tweet from the Central Intelligence Agency’s official account, and it got followers’ attention. “@CIA was the CIA’s twitter just hacked by Russians?” one user...

For Microsoft, Government Data Breaches a Chance to Pivot into Cyber

November 17, 2015 As the federal government reels from a massive data breach that may have exposed the personal information of 22 million people, one tech giant hopes this and other intrusions drum up demand for its cybersecurity products. For the Office of Personnel and Management, the hack has been a wake-up call,...

NIST Testing out Passwordless Smart Home

November 16, 2015 The federal government wants consumers to abandon passwords, even for smart home appliances that collect large amounts of personal data. As part of a new pilot, the National Institute for Standards and Technology awarded a $1.86 million grant to a tech company claiming it can devise a security system that...

Watchdog: IRS Tech Still Puts Taxpayer Data at Risk

November 13, 2015 Deficiencies in the Internal Revenue Service's information security could put taxpayer information at risk of exposure or modification, a new watchdog report claims. The "collective effect" of security flaws from past years, many of which persist in 2015 -- including weak passwords and insufficient system monitoring -- is that the...

Federal Government Takes a Bet on Quantum Computing with New D-Wave Purchase

November 12, 2015 The Los Alamos National Laboratory is buying a new quantum computing processor from Canadian company D-Wave, the national security technology laboratory announced this week. Los Alamos, which develops a wide variety of technology, including systems for monitoring nuclear stockpiles, will be the first federal entity to purchase a D-Wave system...

On Veterans Day, VA Quietly Unveils New 'Vets.gov'

November 11, 2015 The Department of Veterans Affairs has quietly unveiled the beta version of Vets.gov, a new site eventually intended to give users single sign-on access to thousands of online veteran services. Currently, the site is a bare-bones framework of that vision. The site points users to explanations of veterans' education and...

Can the Pentagon Ditch the Password and Finally Embrace the 'Internet of Things'?

November 11, 2015 Today's soldiers might be less technologically equipped than the average person. Soldiers primarily use radio systems and voice recorders for communication, accessed through the military Wideband Networking protocol. Civilians, in contrast, use a variety of Web applications on 3G and 4G Internet, digitally-enabled home appliances, wearable devices and mobile phones...