Digital Government

DOD IG Issues Guidance for Removing Sensitive Tech and Data from Afghanistan

Service members’ records were mishandled during previous contingency operations. The watchdog suggested learning from the past. 

Cybersecurity

Homeland Security Considering CMMC-like Compliance Effort

The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices.

Cybersecurity

Senate panel wants DHS to focus intel activities on foreign threats

The Senate version of the annual intelligence authorization bill, which passed out of committee last week, includes a warning to DHS' intelligence arm to distinguish more carefully between its foreign and domestic missions.

Ideas

Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises

The company will use some clever math to sniff them for instances of child abuse without looking at the photos.

Cybersecurity

New Solarium report highlights policy strides, funding stumbling blocks

Much of the Cyberspace Solarium Commission's recommendations are "on track" to being implemented, but funding issues loom for some.

Ideas

Defense Leaders Can Mitigate Telework Risks

Remote work promises to make the workforce more responsive and efficient, but it also presents significant security challenges, a former ODNI cyber chief says.

Cybersecurity

A tribute to Soraya Correa, DHS' procurement icon

Steve Kelman reflects on a 40-year career that brought real innovation to federal acquisition.

Cybersecurity

DOD looks for answers on GPS data spoofing

The Defense Department is looking for technology solutions to obviate the growing threat of location data spoofing targeting satellite-based systems.

Cybersecurity

House Republicans Ask Commerce to Add Former Huawei Entity to Government Blacklist

They also requested a briefing from the End-User Committee which designates additions to the Entity List.

Cybersecurity

Agency zero trust does not start from point zero

The good news is that consistent IT policy spanning previous presidential administrations has allowed the federal government to slowly put the necessary building blocks in place for the inevitable zero trust architecture journey.

Modernization

NSA Awards Secret $10 Billion Contract to Amazon

Much of the NSA’s most prized intelligence data may be moving to the cloud.   

Podcasts

Critical Update: How Federal Agencies Can Help Avert Quantum Catastrophe

The White House is working on plans to roll out new cryptographic systems that will require epic levels of funding from Congress and coordination, both within the government and in partnership with industry. 

Ideas

What Is Pegasus? A Cybersecurity Expert Explains How the Spyware Invades Phones and What It Does When It Gets In

Since 2019, Pegasus users have been able to install the software on smartphones with a missed call on WhatsApp.

Cybersecurity

CISA Steps Up Governmentwide Recruitment Effort With New Training Guide

The guide brings together various ways the agency and its partners are trying to address the government's perennial workforce challenge.

Ideas

Augmentation for Data-Driven Success

Augmentation techniques can help the Defense Department implement its data strategy goals.

Cybersecurity

Inconsistent job coding may undercut DOD’s cyber workforce efforts

A DOD inspector general audit found that while the Pentagon has made strides, inconsistent job coding for civilian cyber work roles across filled and vacant positions may hinder recruiting and retention.

Cybersecurity

Report Draws Attention to Vulnerabilities in Commercial-Off-the-Shelf Products 

Commercial products bought without modification are largely exempt from government acquisition regulations, including the Defense Department’s emerging certification program.