Data integrity issues hampering USPS commercial mailing program, IG says

Problems with data integrity, customer service and communication are hampering the Postal Service's move to an automated system for commercial mail, a report found.

NIST considers update to e-authentication guideline

The National Institute of Standards and Technology is looking into updating its 2012 Electronic Authentication Guideline (pdf), and the agency wants the public's help. NIST is seeking comments...

IG: DoD must speed migration to IPv6

The Defense Department's inability to properly move to Internet protocol version 6, or IPv6, could mean cost increases and vulnerability to cyber threats, a new report found.

Attribution remains difficult to identify in cyber espionage, finds data breach report

Twenty percent of cyberespionage attacks last year targeted the public sector – only second to manufacturing, with 27 percent of cyber espionage incidents – finds Verizon in its eighth annual data breach report.

FAA should develop holistic threat model as it transitions to NextGen system, GAO says

As the Federal Aviation Administration shifts to a more advanced and networked Internet-technology based air-traffic control system, it needs to develop a comprehensive threat model to better protect computer networks against cyber threats.

Spotlight: GSA is live blogging #TaxDay web traffic

The General Services Administration's DigitalGov team is live blogging their observations on web traffic to federal websites on "Tax Day".

Firm: Hacker campaign against Israeli, Jewish groups limited to website vandalism

Hacking activities were in line with what the FBI predicted would happen. It said the groups can perform "low-level" distributed denial-of-service, or DDoS, attacks and website defacements, but the latter tactic is more likely.

USPS audit finds HR chief uses data effectively but merging systems can make process better

Although the top human resources officer for the U.S. Postal Service effectively uses internal data to manage strategic goals and lessen risk, data usage can be improved by further consolidating legacy systems.

IG: Disaster recovery of EPA information systems may be difficult without key updates

The agency's inspector general, which conducted the audit from March 2014 to January 2015, focused on EPA's National Computer Center, or NCC, that provides critical computing and data management support for a large segment of its administrative, programmatic and scientific applications.

GPO touts web design services with new

The Government Publishing Office made strides last week in its campaign to be regarded as more than the federal government's printing shop. The office, which until late last year was known as the Government Printing Office, handled the redesign of the Commerce Department's new

GAO: Shortcomings in FDIC's information security program could expose sensitive data

Despite progress, weaknesses remain within the Federal Deposit Insurance Corporation's information security program, ranging from inadequate policies and procedures to user access.

Feds kick off new 'IT Solutions Challenge' involving 'best and brightest' workers

A select federal IT and IT acquisition workforce will identify problems within agencies and across the government and then work on potential solutions over the next six months.

Cyber attacks against industrial control systems, retailer point-of-sale systems see surge in 2014

Dell's annual threat report focused on the most common attacks last year. The report uses data from its Global Response Intelligence Defense network and network traffic data from Dell SonicWALL.

Identity management, data integrity remain pain points for a range of companies in protecting consumer data, says NIST

As corporations consider the protection of company and customer data, security, privacy and usability are a major focus but businesses cited several challenges in taking such measures. Identity management and data integrity are among the issues highlighted in a draft interagency report (pdf) published by the National Institute of Standards and Technology April 2.

Spotlight: Commerce Dept. blocks U.S. chip export aimed to power China supercomputer

American chip manufacturer Intel confirmed to the Wall Street Journal April 7 that the Commerce Department denied the company an export license late last fall to supply chips to China for its Tianhe-2 supercomputer project.

Despite easing tensions, Iran's cyber capabilities remain a threat, says panel

Recent work toward a nuclear deal with Iran has smoothed relations between the country and the United States, but Iran's seemingly dormant cyber operations infrastructure remains poised for deployment at any time, according to a panel of experts.

Treasury restores some functionality lost in redesign, stands up GitHub page for feedback

Changes made over the past week show "this isn't a one and done thing" said a Treasury official speaking on background. "It's iterative. It's going to be a continuous process," he added.

Obama signs order to allow sanctions on individuals who threaten national cybersecurity

President Obama last week signed an executive order that makes it possible to impose sanctions on individuals who threaten national cybersecurity.

Fever Pitch

For years cybersecurity lagged compared to other competing priorities, as federal officials dealt with other programs affected by tighter budgets and resources. But with an intensifying threat, that's changed. Read the report

GAO finds Copyright Office's IT lacking

The Copyright Office has serious holes in its management and use of information technology, a new report found. The office has had no permanent chief information officer for more than two years and its request for more than $7 million to invest in and improve IT in fiscal 2015 and 2016 lacks justification