The Nuclear Regulatory Commission needs to perform continuous monitoring of its information systems and update its system security plans, according to a recently released internal audit.
As cyber threats, attacks and espionage escalate against the United States, the Justice Department needs to make sure it's properly addressing these issues in a coordinated manner and sharing critical information with industry, among other measures, the inspector general said.
While the security of the Agriculture Department's IT systems continues to improve, they're still vulnerable due to "longstanding weaknesses." The inspector general evaluated the department's overall security program as part of the Federal Information Security Management Act, or FISMA, which establishes baseline security standards for all agencies.
The Environmental Protection Agency needs to correct several deficiencies found in its configuration management program, an internal audit found.
Several major electronic privacy organizations have filed amicus briefs, supporting the Federal Trade Commission's lawsuit against Wyndham Worldwide Corp. that, the commission alleged, failed to protect consumer information.
Since 2008, NSF has invested more than $250 million for fundamental research into "smart," networked systems that underlie advances such as autonomous cars, robotic surgery and smart grids.
A federal regulatory body is discussing a rule change Nov. 5 that would allow the FBI to conduct electronic surveillance of devices wherever they're located.
An internal audit found a number of problems among the U.S. Patent and Trademark Office's two major advanced IT initiatives currently in development.
Insufficient project requirements, among other problems, are continuing to delay a now four-year-old Internal Revenue Service IT modernization effort, designed to help taxpayers resolve disputes with the agency, the internal watchdog finds.
System administrators working at federal agencies and departments can minimize the risk associated with running virtualized machines on a single host computer, called a hypervisor, by isolating VMs, controlling access, and managing privileged operations and interactions, according to draft security guidance (pdf) issued by the National Institute of Standards and Technology Oct. 20.