Digital Government

Customs Deploying Biometric Tech at Ports Without Fully Addressing Privacy Requirements, GAO Finds

A new audit shows Customs and Border Protection isn’t providing enough transparency to travelers regarding facial recognition technology at ports.

Cybersecurity

OMB Starts Clock on Agencies Implementing Policies to Welcome Public Security Research

CISA also released a binding operational directive and will start scanning government systems for the policies when time is up in six months.

Ideas

What Agencies Need to Know About TIC 3.0 and Enabling Technology

The third version of the Trusted Internet Connection policy brings government IT closer to the capabilities available to the private sector. 

Cybersecurity

CISA, International Counterparts Highlight Mistakes Organizations Make After a Cyber Intrusion

A lot of what’s necessary to appropriately respond to a cyber incident should happen way in advance.

Digital Government

DHS Shares People’s Personal Information with 11 Government Programs, Saving Taxpayers Millions

The agency released its annual report on automated data sharing, touting the economic benefits by reducing costs and erroneous and duplicative payments.

Cybersecurity

Cyber Defenders

In this ebook, Nextgov talks to top cyber-focused officials about the programs that aim to secure federal information and networks.

Cybersecurity

Federal Agencies Warn North Korean Hackers Have Upgraded Their Cash-Out Schemes

A joint alert shared details of tactics and malware used by a state subgroup the U.S. government calls the BeagleBoyz.

Podcasts

Critical Update: Why a Government Vulnerability Disclosure Program Is a Big Deal

The new policy could change the government’s relationship with hackers but some agencies have reservations.  

Cybersecurity

CISA Warns of Vulnerabilities in Popular Domain Name System Software 

Security advisories note attackers could remotely exploit flaws to cause a denial of service.

Digital Government

IG Finds Legacy System to Blame for Delayed DHS Data Reporting

The system the Federal Emergency Management Agency uses to track a flood insurance program lacks automation, slowing DATA Act-required reporting down.

Cybersecurity

The President’s Cup Cybersecurity Competition Is Underway

The competition is open to any federal employee, including the Department of Defense and uniformed service members.

Modernization

7 of 10 Agencies Respond to Senator’s Request for IT Modernization Plans

Sen. Maggie Hassan asked for updates on the government’s 10 legacy systems previously flagged as most in need of an update.

Emerging Tech

Homeland Security Testing Lab Wants to Hear About the Best Temperature Screening Tools in the Market

The tools will be assessed and included on a list of recommended products for federal and local emergency responders and law enforcement.

Policy

CBP Shifts to Enterprise Approach to Manage Phone Searches at U.S. Borders

The agency uses metadata to create a system of record for electronic device searches but agents may be able to access information irrelevant to their cases. 

Artificial Intelligence

How Agencies Can Tackle Tech Talent Gaps

Strong brands and room for risk might pay off where government salaries don’t, federal officials said.

Cybersecurity

CISA Finalized Directive on Vulnerability Disclosure Policies, Congressman Says 

The binding operational directive would create a legal path for ethical hackers to report website vulnerabilities to government agencies.

Emerging Tech

TSA’s Looking to Rapidly Verify Passengers Without Biometrics or Physical IDs

Prior to the pandemic, hundreds of travelers would attempt to pass through security checkpoints each day without identification.

Modernization

How CBP Plans to Spend—and Repay—Its $15M Modernization Fund Loan

Agency officials already completed the first phase of modernizing the nation’s second-largest revenue collection system but needed an infusion of cash to keep the momentum going.

Modernization

CISA Releases Final TIC 3 Guidance

The agency plans to finalize the first two use cases for the Trusted Internet Connection program later this summer.