NIST rides identity, privacy momentum with two new projects

The National Institute of Standards and Technology is collaborating on two new projects that aim to foster the development of privacy-enhancing technologies.

Spotlight: Sanders, Bush rank worst for campaign website security in new report

Presidential candidates Bernie Sanders and Jeb Bush earned a "C" — the lowest grade assigned — for the security of their websites in a new report.

Air Force looks to do for HR forms what it did for the flight bag

"That whole HR lifeline that we all use every day in our own worlds — just took look at a pay stub or our insurance — is a core focus of ours," said Air Force CIO William Marion.

High-performance computing, precision medicine top priorities in White House strategy

President Obama on Oct. 21 rolled out an updated "Strategy for American Innovation" — replacing the strategy last revised in 2011 with one that further leverages information technology to advance the nation. 

OMB proposes major update to policy for acquiring, managing and securing IT

After 15 years, the Office of Management and Budget issued a draft update to the major policy that governs how agencies plan, budget, acquire, manage personnel, secure, share and maintain information technology resources.

Census Bureau could save big by reusing information government already has, says GAO

As it gears up for the next decennial census, the Census Bureau may have found a way to save more than $1 billion by using contact information the government already has to verify the addresses of nonresponders.

Spotlight: Legal interpretations make it unlikely states, territories will opt out of FirstNet

The legal interpretations "severely limit an opt-out state's potential reward" for building and running its own network.

Q&A: A deep dive on the Identity Ecosystem Framework with IDESG's Kimberly Little Sutherland

Kimberly Little Sutherland, the IDESG's plenary chair and senior director of identity management strategy at LexisNexis Risk Solutions, sat down with FierceGovernmentIT to discuss the process of crafting the framework, how federal agencies should use it and what the documents' release means for the future of the organization.

New framework lays the foundation for 'identity ecosystem' to enhance privacy, security on the Internet

With the release of the framework, the group delivers the first tangible result of National Strategy for Trusted Identities in Cyberspace, a visionary plan rolled out by the White House in April 2011.

Hacker claims breach on CIA director Brennan's personal AOL account

A group of hackers claims one of their own hacked CIA director John Brennan's personal email account, according to several reports and unverified documents that the hackers have shared over social networks.

PR or forensics? A closer look at post-breach response

Recent breaches at the Office of Personnel Management resulted in the theft of some 21.5 million individuals' personal information and rocked federal IT — but the peculiar public communication timeline warrants a closer look.

Defense Science Board recommends vigilance against insider threats

The Defense Science Board recommends that the Defense Department continuously monitor cleared personnel to avoid "strategic surprise." 

Attack aftermath

What happens once an intrusion is discovered? We may never know how much time is spent on public affairs prep, readying identity theft protection contracts or closed-door briefings on the Hill. But this special report sheds light on the cyber forensic period that follows a breach and the challenges associated with responding to an attack. 

Spotlight: GAO reveals restricted report list

The Government Accountability Office has published a list of all of their "restricted products," or reports and investigations conducted by the watchdog organization but not publicly released. 

After cyber pact, China-affiliated actors continue to target US businesses for cyberespionage, finds report

Just one day after reaching a landmark agreement aimed at preventing state-sponsored cyber intrusions, China-affiliated actors hacked U.S. companies with the intent to steal intellectual property and trade secrets, according to analysis by cybersecurity company CrowdStrike.

ONC moves into 'next phase' of Meaningful Use implementation

The Office of the National Coordinator for Health IT is switching gears to the challenging work of policy implementation, after earlier this month issuing updated rules for the meaningful use of health information technology for healthcare delivery.

GSA's 15-year, $50B telecom contract hits the market

The General Services Administration Oct. 16 issued a request for proposal for its Enterprise Infrastructure Solutions contract — a 15-year contract with a ceiling of $50 billion that will provide agencies with a list of preapproved vendors for telecommunications services.

Hacker who allegedly sold US service members' personal info to ISIS arrested in Malaysia

A monthslong FBI investigation culminated last week when Malaysian authorities arrested a 20-year-old Kosovar man for allegedly selling the personal information of more than 1,300 members of the United States military to the Islamic State.

GAO: DoD needs 3-D printing lead to fully utilize technology

The Defense Department should designate a position within the Office of the Secretary of Defense to streamline the disparate implementations of 3-D printing within the agency, concluded the Government Accountability Office.

Allison Hickey to step down as head of VBA

Veterans Affairs Department Under Secretary for Benefits Allison Hickey will resign from her position, announced VA Secretary Robert McDonald in an emailed statement Oct. 16.