The National Institute of Standards and Technology is collaborating on two new projects that aim to foster the development of privacy-enhancing technologies.
Presidential candidates Bernie Sanders and Jeb Bush earned a "C" — the lowest grade assigned — for the security of their websites in a new report.
"That whole HR lifeline that we all use every day in our own worlds — just took look at a pay stub or our insurance — is a core focus of ours," said Air Force CIO William Marion.
President Obama on Oct. 21 rolled out an updated "Strategy for American Innovation" — replacing the strategy last revised in 2011 with one that further leverages information technology to advance the nation.
After 15 years, the Office of Management and Budget issued a draft update to the major policy that governs how agencies plan, budget, acquire, manage personnel, secure, share and maintain information technology resources.
As it gears up for the next decennial census, the Census Bureau may have found a way to save more than $1 billion by using contact information the government already has to verify the addresses of nonresponders.
The legal interpretations "severely limit an opt-out state's potential reward" for building and running its own network.
Kimberly Little Sutherland, the IDESG's plenary chair and senior director of identity management strategy at LexisNexis Risk Solutions, sat down with FierceGovernmentIT to discuss the process of crafting the framework, how federal agencies should use it and what the documents' release means for the future of the organization.
New framework lays the foundation for 'identity ecosystem' to enhance privacy, security on the Internet
With the release of the framework, the group delivers the first tangible result of National Strategy for Trusted Identities in Cyberspace, a visionary plan rolled out by the White House in April 2011.
A group of hackers claims one of their own hacked CIA director John Brennan's personal email account, according to several reports and unverified documents that the hackers have shared over social networks.
Recent breaches at the Office of Personnel Management resulted in the theft of some 21.5 million individuals' personal information and rocked federal IT — but the peculiar public communication timeline warrants a closer look.
The Defense Science Board recommends that the Defense Department continuously monitor cleared personnel to avoid "strategic surprise."
What happens once an intrusion is discovered? We may never know how much time is spent on public affairs prep, readying identity theft protection contracts or closed-door briefings on the Hill. But this special report sheds light on the cyber forensic period that follows a breach and the challenges associated with responding to an attack.
The Government Accountability Office has published a list of all of their "restricted products," or reports and investigations conducted by the watchdog organization but not publicly released.
After cyber pact, China-affiliated actors continue to target US businesses for cyberespionage, finds report
Just one day after reaching a landmark agreement aimed at preventing state-sponsored cyber intrusions, China-affiliated actors hacked U.S. companies with the intent to steal intellectual property and trade secrets, according to analysis by cybersecurity company CrowdStrike.
The Office of the National Coordinator for Health IT is switching gears to the challenging work of policy implementation, after earlier this month issuing updated rules for the meaningful use of health information technology for healthcare delivery.
The General Services Administration Oct. 16 issued a request for proposal for its Enterprise Infrastructure Solutions contract — a 15-year contract with a ceiling of $50 billion that will provide agencies with a list of preapproved vendors for telecommunications services.
A monthslong FBI investigation culminated last week when Malaysian authorities arrested a 20-year-old Kosovar man for allegedly selling the personal information of more than 1,300 members of the United States military to the Islamic State.
The Defense Department should designate a position within the Office of the Secretary of Defense to streamline the disparate implementations of 3-D printing within the agency, concluded the Government Accountability Office.
Veterans Affairs Department Under Secretary for Benefits Allison Hickey will resign from her position, announced VA Secretary Robert McDonald in an emailed statement Oct. 16.