Policy

Merit Board Offers Advice to Fix Reskilling Program That Hasn't Translated to Any New Job Placements

A pilot program to train some non-IT workers with technology skills has not resulted in anyone switching jobs, largely because participants would have needed to take a pay cut.

Presidential Advisers Expected to Push Software-Defined Networking for Secure Comms

Senate Commerce Committee is stockpiling legislation for coordinated investments in the tech.

Weakening Encryption Could Impact Election Security, Coalition Says

An election security group said the Justice Department’s renewed calls for access to encrypted data could impact more than privacy.

One State May Become the First to Ban Law Enforcement Use of Genealogy Databases

A Utah state representative said he believes lawmakers are prepared to continue their “strong record of protecting individual privacy.”

Survey: Financial-Sector Agencies’ Policies for Sharing Cyber Threats Inconsistent

Respondents describe barriers ranging from a lack of resources to intelligence agencies’ classification decisions.

Inside the CBP-Built ‘Backbone’ of Atlanta’s Biometric Terminal

An executive agency conducting a comprehensive assessment of the technology’s use in aviation security detailed its recent review of America’s first fully biometric terminal—and the service it runs on.

Defense Pledges to Do a Better Job of Sharing Security Information With Overseas Contractors 

The State Department has yet to respond to an industry association letter expressing concern over contractor safety. 

DOD CIO Is Prepping Guidance on Endpoint Management

The department aims to clarify what beyond desktops qualifies as an endpoint.

Do Roundabouts Make Drivers Better or Worse? Transportation Wants to See the Data.

The National Highway Traffic Safety Administration wants help sorting data on how drivers behave in certain traffic patterns.

Pentagon Must Focus on Reliability When Buying Weapons Systems, Auditor Says

The Government Accountability Office report holds implications for cybersecurity considerations in procurement processes.

Featured eBooks

As Putin Schemes to Extend His Reign, Expect New Forms of Internet Repression

Russia under a president-for-life will likely grow more insular and less open to Western influence.

Lawmakers Launch Caucus to Address Emerging Tech’s Impact on Work

The Future of Work Caucus’ ultimate goal is to develop a comprehensive policy strategy to proactively address emerging technologies’ impact on jobs and workers across the U.S.

DOD Aims to Issue Proposed Rule for Certifying Contractors’ Cybersecurity in the Fall 

Requests for proposals are still expected to include related requirements at that time.

Trump Administration to Expand Hiring Pilot Programs in 2020

Pilot program with simpler resumes and more input from subject matter experts in assessing candidates will reach at least five additional agencies this year.

Senate Passes Legislation to Help Boost and Secure the Internet of Things

Billions of connected devices could offer new economic opportunities—and security challenges—over the course of the next decade.

Cyberspace Is the Next Front in Iran-U.S. Conflict—and Private Companies May Bear the Brunt

Businesses are at high risk, and strict American criminal laws prohibit many forms of cyber self-defense by private companies.

AI Can Now Read Emotions—Should It?

These systems can give incorrect results just like any other form of intelligence.