The Federal Communications Commission says it may be able to re-establish net-neutrality requirements on broadband providers through existing authority in the Telecommunications Act of 1996.
Windows XP remained the most prevalent desktop operating system within the Homeland Security Department as of March 2013, according to an internal assessment of component compliance with the federal security configuration baseline.
Backlash in Europe against revelations of bulk surveillance by U.S. intelligence agencies intensified this month, with German Chancellor Angela Merkel endorsing the idea of a communications network that would keep Europeans' data from passing through the United States.
When the Federal CIO Council announced in April 2013 a catalog of shared services available to agencies in furtherance of the Office of Management and Budget's policy of "Shared First," FierceGovernmentIT grew curious about the contents of the catalog. FierceGovernmentIT filed almost immediately a Freedom of Information Act request for a list of all the services in the catalog. We wanted to see the building blocks of the transformation, but couldn't on our own, since OMB keeps the list behind a password protected website.
A June 2015 expiration of the Patriot Act section the intelligence community says authorizes the bulk storage of telephony metadata means the Obama administration should act now to propose legislative changes, said Rep. Jim Sensenbrenner (R-Wisc.).
Suspending the U.S.-EU Safe Harbor Framework would have major repercussions – not just for trade, but for the nature of the Internet, said Francois Rivasseau, deputy head of the EU Delegation to the United States.
The Justice Department agreed to somewhat loosen restrictions on surveillance reports made public by Internet companies in response to a lawsuit filed by tech giants, including Google, Microsoft and Facebook.
A federal privacy oversight board says the federal government should end the intelligence community's bulk storage of telephony metadata, stating that it has "shown minimal value" in counterterrorism efforts and that it raises constitutional concerns.
Using a new model that assesses cyber risks, costs and benefits over time, malicious actors can time attacks for the most damaging opportunities – and cyber defenses can be ramped-up in anticipation of a strike, says a new paper published in the Proceedings of the National Academy of Sciences.
Under the compromise fiscal 2014 omnibus act (H.R. 3547) that funds the entire federal government this fiscal year, the DHS OCIO has $257.16 million in appropriations. That's an amount about 21 percent less than the office's request of $327.25 million.