The House of Representatives passed the Protecting Cyber Networks Act (H.R. 1560) April 22 and the National Cybersecurity Protection Advancement Act of 2015 (H.R. 1731) April 23.
The agency has strengthened its contractual clauses and is also making sure all agency contracts have the appropriate clauses in them – that is "clauses that require segregation of data."
In a new draft publication, the National Institute of Standards and Technology explores techniques for de-identification and summarizes almost 20 years of research.
The Obama administration largely supports both bills although it had some reservations regarding their liability protections. But civil liberties and privacy groups say they strongly opposed one bill sponsored by the House Permanent Select Committee on Intelligence.
NOAA collects about 20 terabytes of data daily, more than twice the data of the entire printed collection of the Library of Congress. But the public has access to only a fraction of it.
The survey looked at the public's level of awareness on governmental efforts to share data, data usage in tracking performance and accountability, and routine online interactions with governments such as license renewal or information searches.
Dynatrace, a software vendor that measures end user experience online, analyzed websites of several select state revenue departments and found a wide range of how fast their websites and pages loaded as well as how consistent these sites were throughout the day.
Jonathan Mostowski at U.S. Digital Service explores how hiring Leonardo da Vinci to paint the Mona Lisa using agile or waterfall contracting models would affect the final product
Through the Office of Management and Budget initiative launched three years ago that requires agencies to review their IT investments annually and cut duplication, agencies were supposed to save $5.8 billion between fiscal 2013 and 2015. However, they reduced that amount to $2 billion, a 68 percent cut.
An insufficient cybersecurity workforce – propagated by inadequate recruitment and retention measures – is hampering proper defense, according to a new report.
Problems with data integrity, customer service and communication are hampering the Postal Service's move to an automated system for commercial mail, a report found.
The Defense Department's inability to properly move to Internet protocol version 6, or IPv6, could mean cost increases and vulnerability to cyber threats, a new report found.
Twenty percent of cyberespionage attacks last year targeted the public sector – only second to manufacturing, with 27 percent of cyber espionage incidents – finds Verizon in its eighth annual data breach report.
As the Federal Aviation Administration shifts to a more advanced and networked Internet-technology based air-traffic control system, it needs to develop a comprehensive threat model to better protect computer networks against cyber threats.
The General Services Administration's DigitalGov team is live blogging their observations on web traffic to federal websites on "Tax Day".
Hacking activities were in line with what the FBI predicted would happen. It said the groups can perform "low-level" distributed denial-of-service, or DDoS, attacks and website defacements, but the latter tactic is more likely.
Although the top human resources officer for the U.S. Postal Service effectively uses internal data to manage strategic goals and lessen risk, data usage can be improved by further consolidating legacy systems.
The agency's inspector general, which conducted the audit from March 2014 to January 2015, focused on EPA's National Computer Center, or NCC, that provides critical computing and data management support for a large segment of its administrative, programmatic and scientific applications.