More than five years ago, Dawn Leaf led the National Institute of Standards and Technology's work to write a cloud computing roadmap for the federal government. Since that time, there's been no shortage of additional resources for departments to rely on as they move systems to the cloud, but as Labor Department chief information officer, Leaf sees an important element missing.
The lab's Network Mapping System tool, which helps information technology managers discover and characterize their networks, has been licensed to Washington, D.C.-based Cambridge Global Advisors.
Darkode is a password-protected online forum where cybercriminals buy, sell and trade information, skills and products to hack into computers and other electronic devices.
Social media, other companies would be required to report 'terrorist activity' under Senate intelligence bill
The measure is part of the larger Intelligence Authorization Act for Fiscal Year 2016, which the Senate Intelligence Committee unanimously passed about three weeks ago. The full Senate has yet to vote on the entire bill.
The branch plans to transition by October its current Network Battle Lab that focused only on experimentation to support the network to the Cyber Battle Lab that will develop, use and assess technologies in cyberspace operations, electronic warfare and spectrum management.
Federal Chief Technology Officer Megan Smith said this upcoming Tech Day is just one of the initiatives she and her team are working on to make the government more tech-savvy.
As DoD tries to better understand its industry partners, Halvorsen isn't seeing the same eagerness from vendors trying to better understand their customer.
The National Security Agency released a cybersecurity tool publicly to GitHub that lets computers maintain a defined security posture.
Office of Personnel Management Director Katherine Archuleta submitted her resignation to President Barack Obama on Friday, according to an emailed statement from an agency spokesperson. Archuleta steps down just one day after publicly announcing that 21.5 million individuals' sensitive records were stolen in a breach of the agency's background investigation database.
Federal investigators confirmed today that 21.5 million people have had their sensitive information, including Social Security numbers, stolen from Office of Personnel Management background investigation databases.
The federal government has a "leading suspect" in its investigation of two information technology system breaches at the Office of Personnel Management that compromised the sensitive data of millions of people.
The National Treasury Employees Union has sued the Office of Personnel management over the recently disclosed data breach.
Progress continues on plans to shift control of the Internet's Domain Name System from a Commerce Department agency to a private stakeholder community as the unofficial Sept. 15 deadline approaches.
A proposal to amend and modernize cybercrime laws was met with support from federal officials and industry executives alike.
The Marine Corps is directing its information technology system administrators to immediately implement public key infrastructure, or PKI, encryption as part of a review of cybersecurity at the service. Privileged user authentication and PKI are mandatory requirements, according to a memo issued July 1.
A U.N. group has agreed to a set of "cyberspace rules of the road," dictating international cyber relations.
Two new information technology security building blocks proposed through a National Institute of Standards and Technology public-private partnership could help organizations make email and mobile devices more secure.
Cyber-physical systems seem poised to flourish in the near future as technology advances, but a recent report from the National Research Council says education and training in the United States needs to improve to fulfill the demand for talent in this area.
The web-based licensing system generally meets operational capabilities as intended, but use varies among license reviewers, who evaluate new or amended license applications, and inspectors, who visit licensees to make sure they comply.
Army researchers have designed a user interface for a system that enables computers to better manage tens of thousands of images, enhancing how Defense Department intelligence analysts search, filter and explore such visual media.