Cybersecurity

Justice Indicts 80 People In International Nigerian Email Scam

The fraud ring—allegedly led by U.S.-based Nigerian nationals—was working $46 million in email, romance and other schemes when law enforcement pounced.

Ideas

How to Manage Risk Along the Federal Government Supply Chain 

Even the most sophisticated federal agencies have found it difficult to effectively measure and evaluate the cyber risk of their contractor base.

Cybersecurity

CISA Chief Unveils Vision for Federal Cybersecurity

Civilian agencies shouldn’t all be forced to manage their own cyber risks, Chris Krebs said.

Ideas

Don't Ban New Technologies – Experiment with Them Carefully

Asking for forgiveness instead of permission has its place.

Cybersecurity

Senators Question Traffic Safety Agency About Cyber Dangers Posed by Internet-Connected Cars

Sens. Ed Markey and Richard Blumenthal want to know why investors have been made more aware of the potential cyber risks than the general public.

IT Modernization

CISA Awards GDIT a $325 Million Emergency Communications Contract

Under the contract, the company will support the systems federal leaders and others use to coordinate responses to during natural disasters, acts of terrorism and other crises.

Emerging Tech

Military Scientists Harness AI To Fight Synthetic Opioids

A DIA group that scans millions of websites is overwhelming law enforcement with solid tips.

CIO Briefing

Defense Department Inaction Is Hurting Effort to Improve Pentagon Efficiency

Officials are nearly two years late in meeting some congressional requirements, a watchdog found.

CIO Briefing

Your Brain Doesn't Recharge If You Use Your Phone on Break

Participants who took phone breaks experienced the highest levels of mental depletion.

Cybersecurity

Cyber Reskilling Grads Gained Valuable Skills But Not New Jobs Yet

Two graduates from the first class of the new Cyber Reskilling Academy said the program changed the way they see technology and their current jobs but won’t be changing their job titles anytime soon.

Cybersecurity

Playing Defense Against Chinese Tech Threats ‘Will Only Get Us So Far,’ Lawmaker Says 

Rep. Mike Gallagher said the government needs to take a more active role in curbing the global rise of Huawei and other Chinese tech companies.

IT Modernization

Agencies May Not Meet EIS Deadline, But Future Extensions Aren’t in Sight

GSA’s Office of Telecommunication Services director offered an update on the contract vehicle’s progress.

Emerging Tech

The Pentagon Is Turning to Nature to Solve Its Most Complex Problems

DARPA is exploring ways to harness chemical reactions, biological processes and other natural phenomena to build a more efficient computer.

Featured eBooks

Cybersecurity

Coordinated Ransomware Attack in Texas Seen as Escalation From Prior Hacks

Twenty-three local governments were attacked over the weekend. The willingness of city governments to pay ransoms may be emboldening opportunistic hackers, security experts warn.

Ideas

How Cities Are Getting Smarter

There isn’t one definition of a smart city technology, but here are places governments are making progress.

Cybersecurity

Twitter, Facebook Turn Off Hundreds of Accounts Linked to Chinese Disinformation about Hong Kong Protests

In simultaneous press releases, the social-media companies say they have shut down large amounts of Beijing-controlled activity.

Emerging Tech

Pilots, Bias Important Considerations Ahead of Deploying AI

Cloud technology makes piloting artificial intelligence efforts easier than ever, but hard decisions around bias need to be confronted.

IT Modernization

App Failure Led to Long Airport Lines In Third CBP System Crash In Three Years

Technicians were able to reboot the system in a matter of hours but the crash led to significant delays for travelers Friday.

Emerging Tech

DHS is Collecting Biometrics on Thousands of Refugees Who Will Never Enter the U.S.

Most refugees who apply for asylum in the U.S. never set foot in the country, but under an agreement with the United Nations, DHS and its partners can still build biometric profiles on them.