Report: Use of shared IP storage networks on the rise

More than a third of business-critical workloads are accessed through a shared IP storage network, not a dedicated one, a new study found.

Study: Americans would wait longer for tax refunds to cut fraud

Americans are willing to wait longer to get their tax refunds if it means a decreased likelihood of fraud, according to a new survey.

More definition needed for federal CISO role, official says

President Obama's plan to name a federal chief information security officer must be followed with more careful consideration, according to a draft letter to the president from the National Security Telecommunications Advisory Committee, or NSTAC.

Spotlight: Patchless NASA networks in jeopardy

Software patching has been largely neglected at NASA, according to internal documents obtained by FederalNewsRadio

18F issues draft RFQ for FedRAMP dashboard

In seeking a better sense of the certification process under the Federal Risk and Authorization Management Program, or FedRAMP, the General Services Administration's innovation agency, 18F, issued a draft request for proposals for a dashboard.

Private sector buy-in critical to cybersecurity commission success

The success of the President's Commission for Enhancing National Cybersecurity depends heavily on buy-in and advocacy from the private sector, agency officials explained at a New America cybersecurity conference in Washington, D.C., last Wednesday.

Spotlight: GPO moves library websites to Amazon cloud

The Government Publishing Office, or GPO, is continuing its move to the cloud by transitioning the Integrated Library System's public websites to Amazon Cloud Services.

GAO: Ineffective coordination inhibits DoD assessment of satellite alternatives

A Department of Defense-conducted Analysis of Alternatives, or AOA, came up short due to self-imposed limitations in the analysis and a failure to properly coordinate with stakeholder agencies, a GAO report found last week.

4 cyber threats dominated 2015, report finds

An assessment of cybersecurity incidents in 2015 revealed four trends, including vulnerabilities in a popular encryption method.

GAO: National Capital Region suffering from interoperable emergency communications

In the nation's capital and surrounding cities, it's imperative that emergency communications be seamless among departments and agencies. A new report found that this is not the case, however.

Report: MITRE's bug-numbering backlog has cyber researchers seeking an alternative

The Register reported that MITRE, which names and assigns numbers to Common Vulnerabilities and Exposures, or CVEs, has built up a backlog over the past six months and several cybersecurity researchers are turning to a new system.

NTIA reviewing ICANN's Internet stewardship transition plan

The Internet Corporation for Assigned Names and Numbers, or ICANN, on Thursday concluded meetings in Morocco with the submission of a comprehensive Internet stewardship transition plan to the U.S. government.

Spotlight: OMB should look to community for open source metrics, says industry exec

In the spirit of openness, one federal IT executive said the White House should consider crowdsourcing the pilot metrics based on what's already available in the community, rather than reinventing the wheel.

NPPD head alarmed by BlackEnergy malware attack on critical infrastructure in Ukraine

"We really did cross a Rubicon, there. That is the first destructive attack against critical infrastructure upon which civilian populations depend, that we've seen," said Suzanne Spaulding, undersecretary for the National Protection and Programs Directorate at DHS.

White House directs agencies to launch acquisition labs to foster innovation

The White House announced an initiative on Wednesday to speed up establishment of new Acquisition Innovation Labs for federal agencies. The new labs will provide a clearer pathway for agency acquisitions, particularly for IT investments.

DISA's Bennett: No IT system is an island

Federal information technology managers need to approach their work with the greater ecosystem in mind, said a Defense Information Systems Agency official at an event this afternoon.

Gaps in HHS continuous monitoring program among audit findings

Although the Health and Human Services Department has formalized its information security continuous monitoring program, implementation gaps persist department wide, according to a new audit.

CFPB retirement calculator under fire from Senate committees

After identifying inaccuracies in a public-facing retirement tool provided by the Consumer Financial Protection Bureau, two lawmakers are dissatisfied that the agency hasn't fully remediated the problems.

Spotlight: Cyber sprint led to cyber sole-sourcing, finds report

According to an investigation by Nextgov, several agencies cited the sprint in justifications to sole source – rather than competitively bid – cybersecurity work. 

Agencies would face new open source software requirements under OMB draft policy

The White House issued a draft policy today that would require federal agencies to open source a significant portion of its software code. Under the proposed Federal Source Code Policy, the Office of Management and Budget would pilot the requirement to share publicly all custom code developed in-house by federal IT personnel and at least 20 percent of newly developed custom code by third party developers or vendors on behalf of a covered agency.