The department's consulting firm 18F pushed for the blanket purchase agreement because there was "explosive" demand for their services to build products for agencies through the agile process and it needed help.
New research finds that there are some simple, non-invasive steps that IT administrators can implement to discourage cyber attackers from carrying out damaging commands.
Defense Secretary Ash Carter said that flexible hybrid electronics will have great potential for the military and commercial sector, namely shaping "electronics to things" rather than the other way around.
The government solutions company is leading the integration effort that will help the agency take advantage of cloud computing services.
State Department employees at the Embassy in Tokyo, including U.S. Ambassador to Japan Caroline Kennedy, used private email to conduct official business, according to the department's inspector general.
As the Defense Department contends with greater and more sophisticated cyber attacks, it needs to enhance security from "chip to the cloud" and boost the speed and performance of system defenses, while remaining cost-effective, according to a recent Lexington Institute blog post.
The Defense Department Wednesday initiated two sets of policies to enforce stricter guidelines when dealing with the 10,000 contractors the department trusts with offsite cyber information.
The National Cybersecurity Center of Excellence is urging utility companies to change decentralized identity management practices at their facilities to shore up a weak link against online attack.
"We may have created some work for people – especially the IGs and GAO – because [they] now have new numbers to report and new things to do when they go in and look at agencies," said Federal CIO Tony Scott.
The agency said the guide isn't official DoD or DISA policy, a security requirement or technical implementation guidance, but "a collection of best practices discovered during the DoD [Chief Information Officer] Cloud Pilots effort."
Chief information officers are not always engaging records managers in the cybersecurity efforts that are underway at federal agencies and departments, said a top National Archives and Records Administration Official.
Tobias Feakin, senior analyst with the Australian Strategic Policy Institute, provides a general framework that outlines what governments should do to develop a proportionate response.
After a hacking group made 36 million email records from infidelity matchmaking website Ashley Madison public, some federal agencies are investigating whether employees breached policy in using the service.
Rapidly emerging web technologies can help law enforcement, court and corrections officers get timely and/or on-demand access to information, track the health levels of offenders and alert them about the whereabouts of individuals, among other benefits.
Thousands of Veterans Affairs Department employees appear to have been using the web-based collaboration tool Yammer since 2008, even though it wasn't approved by the department, potentially exposing some personal and sensitive information.
A DDoS attack occurs when multiple compromised computers or systems, potentially hundreds of thousands, are directed to a single system with the intent of disrupting or denying legitimate users access to information, communications and communications capabilities.
Through recent progress on three data initiatives, the United States is making progress to become a truly "data-driven government," said U.S. Chief Data Scientist DJ Patil. In an Aug. 19 post to the blog Medium, Patil reflected on half a year on the job.
Federal agencies are increasingly engaged in cybersecurity issues and understand they have something to protect, said the White House's cybersecurity czar, but he added that most agencies, like their private-sector counterparts, are not protecting themselves as well as they should.
While recognizing that federal CIOs have a broad set of responsibilities and that there are many critical issues that they manage, we must place a focused eye on whether the issue of accessibility is getting the attention it should.
Former federal employee charged after using U.S. embassy as base for cyberstalking, hacking campaign
A former State Department employee was charged Aug. 18 with nine counts of cyberstalking, seven counts of computer hacking to extort and one count of wire fraud. The defendant allegedly used his government-issued computer at a U.S. embassy to phish, hack and cyberstalk.