More than a third of business-critical workloads are accessed through a shared IP storage network, not a dedicated one, a new study found.
Americans are willing to wait longer to get their tax refunds if it means a decreased likelihood of fraud, according to a new survey.
President Obama's plan to name a federal chief information security officer must be followed with more careful consideration, according to a draft letter to the president from the National Security Telecommunications Advisory Committee, or NSTAC.
Software patching has been largely neglected at NASA, according to internal documents obtained by FederalNewsRadio.
In seeking a better sense of the certification process under the Federal Risk and Authorization Management Program, or FedRAMP, the General Services Administration's innovation agency, 18F, issued a draft request for proposals for a dashboard.
The success of the President's Commission for Enhancing National Cybersecurity depends heavily on buy-in and advocacy from the private sector, agency officials explained at a New America cybersecurity conference in Washington, D.C., last Wednesday.
The Government Publishing Office, or GPO, is continuing its move to the cloud by transitioning the Integrated Library System's public websites to Amazon Cloud Services.
A Department of Defense-conducted Analysis of Alternatives, or AOA, came up short due to self-imposed limitations in the analysis and a failure to properly coordinate with stakeholder agencies, a GAO report found last week.
An assessment of cybersecurity incidents in 2015 revealed four trends, including vulnerabilities in a popular encryption method.
In the nation's capital and surrounding cities, it's imperative that emergency communications be seamless among departments and agencies. A new report found that this is not the case, however.
The Register reported that MITRE, which names and assigns numbers to Common Vulnerabilities and Exposures, or CVEs, has built up a backlog over the past six months and several cybersecurity researchers are turning to a new system.
The Internet Corporation for Assigned Names and Numbers, or ICANN, on Thursday concluded meetings in Morocco with the submission of a comprehensive Internet stewardship transition plan to the U.S. government.
In the spirit of openness, one federal IT executive said the White House should consider crowdsourcing the pilot metrics based on what's already available in the community, rather than reinventing the wheel.
"We really did cross a Rubicon, there. That is the first destructive attack against critical infrastructure upon which civilian populations depend, that we've seen," said Suzanne Spaulding, undersecretary for the National Protection and Programs Directorate at DHS.
The White House announced an initiative on Wednesday to speed up establishment of new Acquisition Innovation Labs for federal agencies. The new labs will provide a clearer pathway for agency acquisitions, particularly for IT investments.
Federal information technology managers need to approach their work with the greater ecosystem in mind, said a Defense Information Systems Agency official at an event this afternoon.
Although the Health and Human Services Department has formalized its information security continuous monitoring program, implementation gaps persist department wide, according to a new audit.
After identifying inaccuracies in a public-facing retirement tool provided by the Consumer Financial Protection Bureau, two lawmakers are dissatisfied that the agency hasn't fully remediated the problems.
According to an investigation by Nextgov, several agencies cited the sprint in justifications to sole source – rather than competitively bid – cybersecurity work.
The White House issued a draft policy today that would require federal agencies to open source a significant portion of its software code. Under the proposed Federal Source Code Policy, the Office of Management and Budget would pilot the requirement to share publicly all custom code developed in-house by federal IT personnel and at least 20 percent of newly developed custom code by third party developers or vendors on behalf of a covered agency.