Acquisition
Proposed NAFTA changes could impact federal IT
Shifts in market access agreements could have in impact on government procurement, especially the ability of U.S. firms to compete for Canadian government work.
Policy
House Votes to Restore Top Cyber Diplomat’s Office
The vote is a rare rift on cyber policy with the Trump administration.
Modernization
Contractor agrees to new security protocols after exposing sensitive DISA data to Russia
Netcracker Technology Corp. signed an agreement to keep U.S. customer data in U.S. systems, settling a case that goes back to the Bush administration.
Policy
Bill to Restore State Department Cyber Office Advances
Secretary of State Rex Tillerson shuttered the office in September.
Cybersecurity
What governments can learn from the original Russian cyber attack
Ten years after Estonia's networks came under siege from a Russian botnet, a group of officials gathered to discuss how the incident helped shape the future of cyber warfare.
Cybersecurity
State Plans to Elevate Cyber Mission, Despite Shuttering Dedicated Office
The claim comes after the department downgraded its main cyber diplomacy office.
Cybersecurity
House Foreign Affairs Leaders Push to Save State Cyber Office
A bipartisan bill would make the cyber coordinator’s office permanent and a presidential appointment.
Cybersecurity
Former State Cyber Coordinator Says It Was a Mistake to Close His Office
The department's former cyber coordinator Chris Painter worries the country is stepping back from its role as a global cyber leader.
Cybersecurity
Tillerson to Slash Cyber Office, Other Special Envoys
The move is part of a broader effort to streamline department operations and reduce its budget.
Cybersecurity
Democrats Attempt to Save State Department’s Cyber Office
An amendment to a major spending bill would prevent Secretary of State Rex Tillerson from closing or moving the cyber coordinator’s office.
Digital Government
Should robots kill?
Over 100 robotics and artificial intelligence experts worldwide warned the United Nations about a future of war that includes autonomous killing machines.
Cybersecurity
Trump targets China for IP policies
A new presidential memorandum tasks the U.S. Trade Representative with addressing China’s policy of compelling foreign companies to divulge trade secrets in exchange for access to the Chinese markets.
Cybersecurity
What can the U.S. learn from the world's largest biometric ID system?
India's biometric identification program needs to better document how it's being used by the public and governments, according to independent researchers.
Cybersecurity
ICS-CERT analyzing grid-crippling malware
ICS-CERT is teasing out signatures of a new family of malware to help identify code that targets critical infrastructure.
Cybersecurity
Cyber Office or Not, State Dept. Will Shape International Cyber Rules, White House Official Says
White House Cyber Lead Rob Joyce also dove into the government's use of Kaspersky anti-virus products and how agency leaders will be held accountable for breaches.
Cybersecurity
International Group Aims to Protect the Core of the Public Internet
Its first task will be tackling what infrastructure should be protected from intelligence services and other groups.
Cybersecurity
NATO cyber center, DHS probe Petya attack
Kevin Scheid, a 32-year veteran of the DOD and OMB, takes over NATO's Communications and Information Agency as investigations continue into who launched the Petya attack and what to do about it.
Cybersecurity
White House Cyber Czar to Play Role in Kushner Innovation Office
White House Cybersecurity Coordinator Rob Joyce will help ensure any government modernization programs build cybersecurity in, he said.
Cybersecurity
International Group Sees New Niche for Bringing Stability to Cyberspace
The Global Commission on the Stability of Cyberspace is on a 3-year mission to create rules of the road.
Cybersecurity
Tallinn 2.0 refines the law of cyberattacks
While the original Tallinn Manual explored how international law applies to cyber warfare, the newly updated version provides analysis on cyber incidents that fall below the level of armed conflict.
Almost There!
Help us tailor content specifically for you: