Author Archive
Jill R. Aitoro
Digital Government
Agencies turn to technology for help reducing payment errors
No single solution will address all risk of fraud or waste in federal programs, OMB official says.
- By Jill R. Aitoro
Modernization
Effective technology in government depends on executive buy-in, leaders say
Enterprise architecture shifts IT strategy from the computer room to the boardroom.
- By Jill R. Aitoro
Cybersecurity
Progress is slow on cybersecurity goals, GAO reports
A lack of clear roles and responsibilities has hindered advances on President Obama's strategy for safeguarding computer networks, officials tell watchdog.
- By Jill R. Aitoro
Digital Government
More than half of major corporations report politically motivated cyberattacks
Nearly two-thirds of companies that operate the world's critical infrastructures say the attacks were somewhat to extremely effective.
- By Jill R. Aitoro
Digital Government
Supreme Court hears arguments in NASA privacy case
Justices will decide whether agency's background checks violate contractors' rights.
- By Jill R. Aitoro
Cybersecurity
Results of cyber drill will help shape final version of response plan
Government, industry participants test procedures in simulated attack as officials put finishing touches on strategy.
- By Jill R. Aitoro
Cybersecurity
State Cybersecurity Budgets Declining
Federal agencies maintain a lot of personal information on their computer networks and systems, but it's actually state governments that are the "custodians of the most comprehensive collection of citizens' personally identifiable Information," according to the National Association of State Chief Information Officers. And yet, 79 percent of state cybersecurity chiefs report stagnant or cut budgets, despite an increase in internal and external threats.
- By Jill R. Aitoro
Cybersecurity
Feds' third cybersecurity exercise to attack content and identities
Cyber Storm III will use known hacker attacks to hijack certificates that verify content is legitimate and e-mails are authentic.
- By Jill R. Aitoro
Modernization
Slow development of radio standards frustrates first responders
Requirements are so complicated that agencies fail to specify elements that must be compliant, resulting in systems that have many proprietary parts that are not interoperable.
- By Jill R. Aitoro
Digital Government
Senate panel tries again to push through data breach bill
Data Security and Breach Notification Act would require businesses and nonprofits to adopt security practices that protect stored information from unauthorized access.
- By Jill R. Aitoro
Digital Government
HHS to use data analytics to uncover Medicare, Medicaid fraud
Software tools will weed out potential incidents of abuse by flagging suspicious activities and anomalies, including unusual patterns in billing and applications for health services, in systems that process requests.
- By Jill R. Aitoro
Featured eBooks
Cybersecurity
TechAmerica: Just Do It
In hopes that Congress will get something of note accomplished before year's end, IT industry association TechAmerica released a statement on Friday encouraging the Senate to pass a vote on several popular cybersecurity reforms before breaking later this month.
- By Jill R. Aitoro
Digital Government
IRS still reliant on Social Security numbers to identify taxpayers
Agency plans to eventually replace SSNs on notices with 2-D bar codes, officials tell the inspector general.
- By Jill R. Aitoro
Digital Government
CBP wants system to detect ultralights smuggling drugs
Officials report an increase in the number of attempts to move narcotics into the United States using the small aircraft, which avoid radar detection by flying low.
- By Jill R. Aitoro
Ideas
Cyber Pays, Commodities Don't
HP announced the latest in a string of acquisitions on Monday, with plans to buy security software company ArcSight for $1.5 billion in cash. In the last six months, the PC manufacturer has announced plans to acquire Fortify, 3Com, Palm and 3PAR, to name a few, giving it a larger footprint in networking, mobile computing and -- most notably -- security.
- By Jill R. Aitoro
Digital Government
Defense lacks doctrine to guide it through cyberwarfare
Top priority for the Cyber Command is to document rules of engagement, GAO officials say.
- By Jill R. Aitoro
Cybersecurity
Now That's Ironic
Oh the irony: According to a report released Thursday by the DHS inspector general, the very system used by the U.S. Computer Emergency Readiness Team to exchange and access mission-critical data about the security posture of civilian networks was vulnerable to attack.
- By Jill R. Aitoro
Cybersecurity
Fed's cybersecurity watchdog found to have security issues
The U.S. Computer Emergency Readiness Team had 540 vulnerabilities that put its systems at risk, IG says.
- By Jill R. Aitoro
Digital Government
DHS to develop single, searchable database of immigration records
System will help identify cases of fraud and assist with intelligence and law enforcement investigations.
- By Jill R. Aitoro
Cybersecurity
iTunes Social Network Spammed
It didn't take very long for Apple's new iTunes social network for music fans, which launched on Sept. 1, to get targeted by spammers.
- By Jill R. Aitoro