An internal audit of the Energy Department's unclassified cybersecurity program found critical and high-risk vulnerabilites across many systems and networks tested, problems with access controls and web applications, and weaknesses in identifying and managing security features across systems.
A new working group comprised of the Federal Aviation Administration and aviation industry members is taking on the task of equipping avionics with next-generation technology by a mandated deadline.
Cyberattacks are likely to increase in the next 10 years, but effective counter measures will minimize damage, a new study found.
Too often agencies are blindly checking a list of requirements rather than really thinking through how the technology they acquire or develop will serve the user, said Greg Godbout, executive director of the General Services Administration's innovation lab called 18F.
The Internal Revenue Service is making significant changes in how it processes tax returns, but a test of the system shows it's not ready for implementation, according to a recently released Treasury Inspector General for Tax Administration report.
A senior Obama administration official acknowledged that federal purchasing rules are difficult to navigate, especially for information technology projects and services, but they're getting the job done – for now.
The American Civil Liberties Union wants the federal government to investigate whether companies are using big data to engage in racial discrimination around online credit marketing—and take action, if they are.
The Army has stepped up recruitment for its new Cyber Branch, the first branch to be formed since the Special Operations Branch nearly 30 years ago.
The National Weather Service experienced a satellite data outage for more than a day last week, prompting the agency to issue a statement that the outage could potentially impact forecast quality.
Insufficient project requirements, among other problems, are continuing to delay a now four-year-old Internal Revenue Service IT modernization effort, designed to help taxpayers resolve disputes with the agency, the internal watchdog finds.
Pentagon must carefully consider 'projected effects' from offensive cyber operations, new document says
If the Pentagon uses offensive military operations in cyberspace, it must first carefully consider "projected effects," including impacts on non-military and foreign policy areas, says a recently declassified military document.
The White House recently launched the "write" application programming interface version of its petitions platform as a way for people to more easily submit signatures from other sites.
A report commissioned by the Homeland Security Department's Science and Technology Directorate says barriers to using and developing open source software must be addressed as IT budgets across government continue to tighten.
With a little help from the General Services Administration's digital search program, federal web managers can now expand search results on their agency and department sites to include results from their Instagram accounts and relevant Federal Register notices.
The Federal Communications Commission Oct. 22 released a second batch of nearly 2.5 million comments about its net neutrality plan that would permit faster Internet service for some websites willing to pay for it.
System administrators working at federal agencies and departments can minimize the risk associated with running virtualized machines on a single host computer, called a hypervisor, by isolating VMs, controlling access, and managing privileged operations and interactions, according to draft security guidance (pdf) issued by the National Institute of Standards and Technology Oct. 20.
The National Institute of Standards and technology Oct. 21 published a final version of its U.S. Government Cloud Computing Technology Roadmap (pdf). The document lays out 10 requirements – each accompanied by "priority action plans" and target completion dates – necessary for cloud adoption by the federal government.
Vulnerabilty testing of the Food and Drug Administration's computer network found several deficiencies that could potentially be exploited by attackers, but auditors did not gain unauthorized access to the network, an internal investigation revealed.
Hydrologist Xiafen "Sherry" Chen was arrested Oct. 20 at at the agency's Wilmington, Ohio, facility after being indicted in U.S. District Court, according to the FBI.