New study promotes creation of professional association to address cybersecurity workforce shortfall
A new study calls for the creation of a professional association to address the shortage of highly trained cybersecurity experts who can deal with cyber hackers, thefts, attacks and disruptions, and vulnerabilities.
The report noted that the agency did not know when its offices were using cloud computing capabilities nor could the EPA provide evidence that it could access contractor's cloud networks for auditing and investigative purposes.
The SSA's Disability Case Processing System, or DCPS, has failed to produce a working system after more than six years of development and $288 million, according to the House Committee on Oversight and Government Reform.
The Census Bureau is combing the industry for information about how it could improve the presence of its public-facing website as well as search and navigation functionality.
Cyber attackers could potentially gain access to critical weather satellite systems through interconnected information systems, an internal Commerce Department audit has found.
The U.S. Army is developing pocket-sized drones for soldiers, potentially providing individual squads with the ability to safely look for enemies around the corner or in a nearby building.
The Defense Department is not doing enough to track how its research and development efforts successfully transition to acquisition programs or are fielded, a new Government Accountability Office report found.
Army researchers are looking into ways to make food for soldiers using 3-D printing, a July 18 Army statement says. The research is coming from the U.S. Army Natick Soldier Research, Development and Engineering Center to help with the Combat Feeding Directorate.
A recent internal audit found that NASA lacked some security measures around its Space Network Project and the White Sands Complex.
The investigation by the HHS inspector general found a number of flaws in the program launch, notably in physical security, enrollment, system access and web security.
The White House has released a new plan to better coordinate how the government conducts, manages and maintains its Earth-observing scientific systems.
NASA is spending more money than it should to maintain one of its software verification and validation facilities, leaving less funding to evaluate the software, a report by the space agency's inspector general found.
The Justice Department said July 22 that it has intervened in a whistleblower lawsuit against Symantec Corp., alleging the company "knowingly" submitted false claims on a General Services Administration software contract that involved hundreds of millions of dollars.
The Army is establishing a standard marketplace where soldiers can acquire servers, ruggedized laptops and other tactical communications hardware in an effective and cost-efficient manner.
The Legged Squad Support System, or LS3, - which is also been nicknamed "Cujo" - is being used for resupply missions to various platoons in a training region in Hawaii.
The Cyber Career Development Program teams up the Lawrence Livermore and Los Alamos national laboratories with Bechtel under a three-year program that will expose recruits to how government and commercial organizations approach cybersecurity by rotating them to a different organization every year of their training.
The U.S. government has just wrapped up one of the largest cyber exercises to date, involving more than 500 participants from the military, law enforcement, civilian agencies, academia and the commercial sector.
A review of a bureau's information systems within the Treasury Department found a "signficant deficiency" in security measures over financial reporting, a Government Accountability Office report released July 18.
A Texas volunteer group that searches for lost and missing persons is resuming use of drones in such efforts after a federal court said the Federal Aviation Agency's email warning the group not to use such unmanned aircraft wasn't legally binding.
Despite implementing stronger computerized defenses, the Federal Deposit Insurance Corporation still needs to address weaknesses that are putting key financial systems and information at "unnecessary risk," congressional investigators said.