Federal departments and agencies were instructed to adopt the use of security-enhanced cards, such as those that use chip-and PIN technology "as soon as possible" in an Oct. 17 executive order signed by President Obama. Chip-and-PIN technology – which uses an embedded chip in credit, debit and other payment cards, in lieu of a magnetic strip, and a personal identification number – has greatly reduced financial fraud and identity theft in Europe.
Representatives from 175 countries will discuss topics such as Internet governance, online security and privacy, and the Internet of Things, as the United Nations' International Telecommunications Union, or ITU, kicked off three weeks of meetings Oct. 20 in Busan, South Korea.
A meeting of the International Conference of Data Protection and Privacy Commissioners concluded Oct. 16, resulting in the adoption of several resolutions, including one focused on privacy and big data. During the event, Federal Trade Commissioner Julie Brill urged privacy representatives from several countries to draft specific solutions to address the discrimination, security and privacy implications of big data.
A new report says the Commerce Department, which provides government data to more companies than any other federal agency, can make improvements in several areas involving data access, quality and dissemination.
A review of cloud computing services in the Commerce Department found missing clauses in contractors' agreements to permit reviews of their facilities and operations, as well as lack of compliance with federal security standards.
A tool being developed for the Army will bring together intelligence, terrain and electromagnetic spectrum data, providing a common operational picture for electronic warfare.
The Labor Department launched a web portal dedicated to helping employers and the technology industry better adopt technology that people with a range of disabilities can use.
An early draft form of the Office of the National Coordinator for Health Information Technology's roadmap to interoperability is based on five elements that will help meet three-, six- and 10-year objectives.
Following successful tests at Boston's Logan International Airport, New York's LaGuardia Airport will be the next site to see how algorithms can improve air traffic management – by reducing the time passenger planes spend taxiing and idling.
Cloud computing technology is ready for the enterprise, but most agencies are not prepared at a policy level to most efficiently implement it, according to a whitepaper published Oct. 10 by the MITRE Corporation and the Advanced Technology Academic Research Center
A new tool promises to help the Army better evaluate evolving tactical networks by allowing for system-of-systems testing before large investments are made, according to the Defense Department.
Training students on how to best use big data has become a major challenge, according to a recent report published by the National Academies Press.
Doctors and hospitals continue to leverage health information technology at an increased rate, according to the Office of the National Coordinator for Health Information Technology's annual report (pdf) to Congress.
The United States will resist all efforts to give "any person, entity or nation" control of the Internet rather than the "global multistakeholder communities," said Commerce Secretary Penny Pritzker in a Oct. 13 speech.
The Obama Administration hopes to overcome resistance to a single, large cybersecurity bill by pushing for several, smaller cybersecurity bills that could increase the odds of passage, said the White House Cybersecurity director during an Oct. 9 event.
Cyberwarfare is not something theoretical or reserved for conflict in the distant future, but happening continuously right now, said Atlantic Council Board Director Gen. Wesley Clark Oct. 9 at an event hosted by the think tank in Washington, D.C.
FAA Deputy Administrator Michael Whitaker said he FAA needs to make sure that airlines and other operators comply with the mandate for implementing the Automatic Dependent Surveillance-Broadcast, or ADS-B, equipment in their aircraft by 2020.
The Army National Guard will use a rapidly deployable, interoperable system to support Internet, phone and radio communications among police, fire fighters and other first responders during disasters.
Malicious insiders, denial of services and malicious code are the most costly cyber crimes for U.S. organizations and account for more than 55 percent of all cyber crime costs per organization on an annual basis, according to an annual report on the cost of cybercrime.
Advanced computing needs are threatening the National Science Foundation's position as a provider of high-powered computing to its researchers, according to a new report.