Problems with data integrity, customer service and communication are hampering the Postal Service's move to an automated system for commercial mail, a report found.
The Defense Department's inability to properly move to Internet protocol version 6, or IPv6, could mean cost increases and vulnerability to cyber threats, a new report found.
Twenty percent of cyberespionage attacks last year targeted the public sector – only second to manufacturing, with 27 percent of cyber espionage incidents – finds Verizon in its eighth annual data breach report.
As the Federal Aviation Administration shifts to a more advanced and networked Internet-technology based air-traffic control system, it needs to develop a comprehensive threat model to better protect computer networks against cyber threats.
The General Services Administration's DigitalGov team is live blogging their observations on web traffic to federal websites on "Tax Day".
Hacking activities were in line with what the FBI predicted would happen. It said the groups can perform "low-level" distributed denial-of-service, or DDoS, attacks and website defacements, but the latter tactic is more likely.
Although the top human resources officer for the U.S. Postal Service effectively uses internal data to manage strategic goals and lessen risk, data usage can be improved by further consolidating legacy systems.
The agency's inspector general, which conducted the audit from March 2014 to January 2015, focused on EPA's National Computer Center, or NCC, that provides critical computing and data management support for a large segment of its administrative, programmatic and scientific applications.
The Government Publishing Office made strides last week in its campaign to be regarded as more than the federal government's printing shop. The office, which until late last year was known as the Government Printing Office, handled the redesign of the Commerce Department's new Commerce.gov.
Despite progress, weaknesses remain within the Federal Deposit Insurance Corporation's information security program, ranging from inadequate policies and procedures to user access.
A select federal IT and IT acquisition workforce will identify problems within agencies and across the government and then work on potential solutions over the next six months.
Dell's annual threat report focused on the most common attacks last year. The report uses data from its Global Response Intelligence Defense network and network traffic data from Dell SonicWALL.
Identity management, data integrity remain pain points for a range of companies in protecting consumer data, says NIST
As corporations consider the protection of company and customer data, security, privacy and usability are a major focus but businesses cited several challenges in taking such measures. Identity management and data integrity are among the issues highlighted in a draft interagency report (pdf) published by the National Institute of Standards and Technology April 2.
American chip manufacturer Intel confirmed to the Wall Street Journal April 7 that the Commerce Department denied the company an export license late last fall to supply chips to China for its Tianhe-2 supercomputer project.
Recent work toward a nuclear deal with Iran has smoothed relations between the country and the United States, but Iran's seemingly dormant cyber operations infrastructure remains poised for deployment at any time, according to a panel of experts.
Treasury restores some functionality lost in USASpending.gov redesign, stands up GitHub page for feedback
Changes made over the past week show "this isn't a one and done thing" said a Treasury official speaking on background. "It's iterative. It's going to be a continuous process," he added.
President Obama last week signed an executive order that makes it possible to impose sanctions on individuals who threaten national cybersecurity.
The Copyright Office has serious holes in its management and use of information technology, a new report found. The office has had no permanent chief information officer for more than two years and its request for more than $7 million to invest in and improve IT in fiscal 2015 and 2016 lacks justification