Kenneth Corbin, CIO, Friday, March 29, 2013
The CIO of the federal government has unveiled the White House's latest blueprint for overhauling and modernizing the IT operations of departments and agencies, calling for a service-oriented model that would more closely resemble the provisioning of IT services in the private sector, at the same time empowering agency CIOs to take a more active role in managing their portfolios.
Wednesday, March 27, 2013
In federal information technology circles, it's become a truism that agencies spend way too much time and effort doing paperwork in pursuit of cybersecurity and not nearly enough on constantly keeping watch over systems and implementing best practices in real-time to make sure those systems are actually better secured than they were the day before. A new report offers a roadmap that purports to offer ways to implement measures that measure cybersecurity outcomes rather than just processes, while recognizing that no two agencies have the exact same risk profile.
Ryan McDermott, FierceGovernmentIT, Wednesday, March 27, 2013
Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report (.pdf) released Tuesday.
Amber Corrin, Federal Computer Week, Wednesday, March 27, 2013
White House efforts to better protect the networks of government agencies and critical infrastructure operators have been described as a down payment on federal cybersecurity, but with fast-moving threats and continued intrusions, officials are looking for ways to get more secure more quickly.
Nicole Blake Johnson, Federal Times, Wednesday, March 27, 2013
A group of former federal information technology executives are calling on the administration to change the way it assesses the cybersecurity of federal networks.
SafeGov.org today released its latest report titled “Measuring What Matters: Reducing Risk by Rethinking How We Evaluate Cybersecurity” during an event at the National Academy of Public Administration’s office in Washington D.C. The report is designed to encourage government and industry experts to collaborate and implement a more effective framework and evaluation process to enhance the government’s data protection posture.
Tags: Experts' Corner
Joseph Marks, Nextgov, Tuesday, March 26, 2013
The comptroller general’s office has denied a federal contractor's protest, clearing the way for the Interior Department to purchase a slate of cloud-based services including cloud storage and application hosting.
Law Office of Bradley S. Shear
Saturday, March 23, 2013
Do children still have an expectation of privacy? Every day our personal privacy is slowly being eroded because of advances in technology. New inventions have enabled our society to more efficiently mass produce food; create the infrastructure to warm our homes and offices in the winter and cool them in the summer; and to invent digital devices that allow us to communicate and share information from around the world and outer space almost instantaneously.
Carrie Ghose, Columbus Business First, Thursday, March 21, 2013
IBM Corp. has won a 10-year, $267 million cloud-computing contract with Ohio that's expected to save the state $150 million over the next five years. IBM will work to reduce the number of machines, power consumption and overall expense of running the state’s secure data center powering the IT of public agencies.
David Perera, FierceGovernmentIT, Wednesday, March 20, 2013
The House Oversight and Government Reform Committee unanimously approved March 20 a bill that would modify statutory federal cybersecurity program requirements.