Cybersecurity
Interior’s Cyber Threat Detection and Defenses are Sufficient, OIG Finds
According to the inspector general’s memorandum, the Department of the Interior detected simulated malicious attacks and responded properly, making improvements from 2015 and 2018 evaluations.
Cybersecurity
CISA's cyber info sharing program didn't always deliver, watchdog says
The Cybersecurity and Infrastructure Security Agency did not always provide more than 300 participants of a public-private cyber threat partnership with actionable information to address potential vulnerabilities, according to an oversight report.
People
A civil servant's effort to humanize government, one fed at a time
An effort to tell the stories of government workers has the goal of letting the American people know that public servants actually care.
Modernization
Industries Embracing Automation Also Face Widening Skills Gaps, Report Finds
The Government Accountability Office noted that all education levels have important skills for in-demand jobs, but higher education levels provide workers with more in-demand skills.
Emerging Tech
Crypto Mining's Energy Consumption Draws Additional Concern from Lawmakers
Leadership on the Energy & Commerce Committee sent four letters to crypto mining platforms about the potentially “severe” impacts of generating the digital currencies.
People
The Biden administration ends COVID-19 testing aimed at unvaccinated workers
Employees will soon face the same safety protocols regardless of vaccination status.
Defense
What's appropriate on social media? DOD spells it out in new guidance
The Department of Defense released its first departmentwide policy for official accounts and the personnel running them.
Cybersecurity
CISA Warns About Exploitation in Online Collaboration Suite
The Cybersecurity and Infrastructure Security Agency issued a cybersecurity advisory warning about active exploitations of vulnerabilities found in systems using unpatched Zimbra Collaboration Suite.
Digital Government
Top Democrats Accuse the DHS Watchdog of Obstructing Their Investigations
Inspector General Joseph Cuffari defended his office’s work, but lawmakers pushed back.
Cybersecurity
OMB Memo Places Zero Trust at the Top of Civilian Agency Priorities
The memorandum sets up budget expectations for previously established cyber goals.
Cybersecurity
An Experiment Showed that the Military Must Change Its Cybersecurity Approach
The Defense Department’s current “checklist” approach can’t keep its networks safe.
Digital Government
GSA’s Dave Zvenyach to Exit Government
In his position leading the Technology Transformation Services, Zvenyach oversaw 18F and other key programs including the burgeoning identity shared service Login.gov.
Cybersecurity
Russia-linked cyber groups used commercial security tools to target Ukraine, report states
Infamous cybercriminal organizations like Cozy Bear have been involved in a string of cyberattacks targeting Ukrainian government agencies, according to new research.
Digital Government
GSA Sketches Out Timeline for Alliant 3's First Glimpse
The General Services Administration's updates for industry include timing for Alliant 3 as well as a higher ceiling for the current Alliant program.
Modernization
DHS Tests New Tech that Could Bring Emergency Alerts to Vehicle Screens
The technology works with the Federal Emergency Management Agency’s Integrated Public Alerting System to display hazard and evacuation alerts on the center console.
Digital Government
Law Enforcement Purchase of Consumer Data Draws Congressional Scrutiny
Democrat lawmakers addressed seven federal law enforcement agencies for documentation of how often data was procured outside formal legal channels.
Acquisition
GSA adds $25 billion to ceiling value of Alliant 2, sketches out timeline for Alliant 3
The General Services Administration's updates for industry include timing for Alliant 3 as well as a higher ceiling for the current Alliant program.
Policy
What does the federal government buy from data brokers?
The chairmen of two House committees want federal agencies to explain what they are doing with "billions of data points on hundreds of millions of Americans" acquired from data brokers.
Ideas