Cybersecurity

Cyber Safety Review Board staffs up

The chair of the Cyber Safety Review Board has ambitious goals for the organization following its public review of the Log4j software vulnerability.

Digital Government

Agencies are still wrangling over death data

Information about deaths is a key part of administering programs like Social Security, but how data is collected and shared comes with questions.

Emerging Tech

The U.S. Army Is Hunting For More Soldier-Connected Tech

A recent solicitation calls for soldier-centered networking and information technology that will link existing and prototype technologies together.

Cybersecurity

VA Systems Vulnerable to Cyber Intrusions Due to Lack of Effective Oversight, Report Says

The Department of Veterans Affairs Inspector General's office said the agency is "leaving its systems vulnerable to compromise by impostors who may gain access to protected information."

Cybersecurity

Cyber Threats Warrant a Government Reorganization, Former CISA Head Says

Inaugural CISA director Chris Krebs said the federal government should do more to respond to cybersecurity and data concerns.

Emerging Tech

Energy Asks for New R&D in Critical Materials for Clean Energy

The Department of Energy launched its new request for information days after the passage of the CHIPS Act.

Modernization

The CHIPS and Science Act Became Law, Now What?

Signing the CHIPS and Science Act was just the start for enhancing U.S. economic strength and national security. 

Cybersecurity

Former CISA chief wants a new, cross-cutting new agency to lead federal cyber

Chris Krebs wants to establish a new agency to focus on privacy, data and cyber risks facing the U.S., or to pull the Cybersecurity and Infrastructure Security Agency from under the Department of Homeland Security.

Defense

The Army is hunting for more soldier-connected tech

A recent solicitation calls for soldier-centered networking and information technology that will link existing and prototype technologies together.

Cybersecurity

'Hack DHS' Bug Bounty Program to Begin Second Phase with New Contract Request

The contract is geared toward companies that can conduct crowdsourced events and competitions for vetted security researchers, to help bolster DHS’ cyber resilience.

People

Biden signs semiconductor Bill, spurring hopes for new jobs and manufacturing around the U.S.

The $54.2 billion measure drew broad support from local leaders, who believe their regions could benefit. “We need to make these chips here in America," the president said.

Modernization

DHS Research Arm Seeks Science, Tech Capabilities to Protect U.S. Agriculture

The agency issued a request for information to support its Food, Agriculture and Veterinary Defense program.

Ideas

New Photos Suggest How Trump, Flush with Power, May Have Sent Official Documents down the Toilet

Photos showing what appear to be torn-up documents in two different toilets may provide more evidence of the former president’s habit of destroying his presidential documents.

Emerging Tech

Mobile Threats Prompt Operational Changes for Government Staff

More than 80% of public sector respondents to a recent survey said they have been forced to re-evaluate workplace practices as attacks on mobile devices grow.

Digital Government

IRS free file figures into Senate Dems' reconciliation bill

Questions about the tax agency's capacity to deliver and support a public online tax filing system.

Digital Government

The Pentagon’s Plan to Speed Up Software Buying for Weapons Systems

The DOD’s dedicated software acquisition pathway is nearly two years old, and is already being used by a few dozen programs.

Digital Government

VA systems vulnerable to cyber intrusions due to lack of effective oversight, report says

The Department of Veterans Affairs Inspector General's office said the agency is "leaving its systems vulnerable to compromise by impostors who may gain access to protected information."

Cybersecurity

FCC, FEMA Raise Alarm Bells About Vulnerabilities in Emergency Alert System

Both agencies warned that software and equipment vulnerabilities could allow hackers to transmit fake emergency messages or disrupt real ones.