Cybersecurity should be at the top of the congressional technology agenda, according to a new poll. Forty percent of registered voters believe cyber attack prevention should be lawmakers' technology policy focus.
The National Science Foundation wants feedback on how the government should focus cybersecurity research and development in order to guide and coordinate federally funded studies.
The ACLU has called for rules that limit law enforcement agencies' use of drones when collecting evidence of wrongdoing, for emergencies or other uses where there's no reason to think it would invade privacy.
UPDATED - GSA IG: Contractors had access to personal data without required training, background checks
Federal contractors without background checks, non-disclosure agreements or required privacy training were able to access sensitive data from Army childcare subsidy payment applications that they were hired to process.
Thrift Savings Plan accounts are vulnerable to hackers because of poor cybersecurity measures at the Federal Retirement Thrift Investment Board, sources say.
The idea behind the Global Forum for Cyber Expertise is to help states with limited policy or technical capacity tap the expertise of more technologically sophisticated countries around certain cyber-related issues.
Nomi Technologies provides consumer-tracking technology for brick-and-mortar retailers, but it didn't provide a way for consumers to opt out of the service within stores as it had seemingly indicated in its privacy policies.
Only one-quarter of federal agency IT officials polled say their network data is protected in transit
And the top challenges in protecting such data are budget constraints, limited resources and the complexity and impact on network performance, the online survey of 200 federal IT officials representing 60 agencies found.
The Defense Department unveiled a new cyber strategy today that affirms its commitment to more effective deterrence in the cyber domain and the integration of offensive cyber options into combatant command plans.
A Freedom of Information Act request from the Sunlight Foundation has turned into federal policy on agency data holdings, the foundation reported.
If enacted, the Data Security and Breach Notification Act of 2015 would cost the government $1 million to implement over five years and would increase revenues, via penalties paid by non-compliant businesses, by $9 million over 10 years, an assessment of the bill finds.
The House of Representatives passed the Protecting Cyber Networks Act (H.R. 1560) April 22 and the National Cybersecurity Protection Advancement Act of 2015 (H.R. 1731) April 23.
The agency has strengthened its contractual clauses and is also making sure all agency contracts have the appropriate clauses in them – that is "clauses that require segregation of data."
In a new draft publication, the National Institute of Standards and Technology explores techniques for de-identification and summarizes almost 20 years of research.
The Obama administration largely supports both bills although it had some reservations regarding their liability protections. But civil liberties and privacy groups say they strongly opposed one bill sponsored by the House Permanent Select Committee on Intelligence.
NOAA collects about 20 terabytes of data daily, more than twice the data of the entire printed collection of the Library of Congress. But the public has access to only a fraction of it.
The survey looked at the public's level of awareness on governmental efforts to share data, data usage in tracking performance and accountability, and routine online interactions with governments such as license renewal or information searches.
Dynatrace, a software vendor that measures end user experience online, analyzed websites of several select state revenue departments and found a wide range of how fast their websites and pages loaded as well as how consistent these sites were throughout the day.
Jonathan Mostowski at U.S. Digital Service explores how hiring Leonardo da Vinci to paint the Mona Lisa using agile or waterfall contracting models would affect the final product