— Security —

Government officials say working with startups improves tech adoption rates.

Emerging technologies are integral to solving federal challenges, and many of the solutions originate from Silicon Valley-type startups. But does the intelligence community rely on these startups to help solve national security issues?

John Kammerer, the technical director of high-performance computing solutions at the National Security Agency, said when it comes to computing, big companies depend on component developers at startups.  

The younger generation is more willing to participate in federal cybersecurity efforts.

Technology itself creates an inevitable generational gap, as it’s been ubiquitous for most teenagers and twentysomethings growing up as digital natives. Baby boomers, however, have had to learn how to use and adapt to new technologies just to keep up.

Many devices in the IoT ecosystem remain unprotected.

Cybersecurity news in recent weeks highlighted the accelerating cycle of attack and counterattack that goes on in the alleyways of the web. It also offers clues to how artificial intelligence systems can help keep cyberthreats from doing extensive damage.

A treasure trove of health data makes the department a primary target.

The federal agency responsible for housing and protecting hundreds of millions of Americans' most sensitive health data spends less on cyber defenses than recommended but manages to successfully ward off a bombardment of cyberattacks every week, according to one of its top officials. 

The old perimeter-centric security strategies no longer work.

The sustained high frequency of successful cyberattacks against corporations and government agencies has made one thing clear: Perimeter-centric security strategies are no longer effective.

With insider attacks, data and IT infrastructure residing in multiple locations, and data traveling across the internet, relying on one layer of security at the perimeter is no longer an option. Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust from the equation.   

U.S. seems to be the early leader in adopting AI ― for now.

In the past two years, governments around the globe have developed plans to prepare for the benefits and advancements of artificial intelligence, and the U.S. seems to be taking the lead ― for now. 

Because "these people in government actually do give a crap."

A federal group dedicated to driving commonality governmentwide to accelerate cloud adoption plans to get outside help and make its information-sharing platform easily and seamlessly accessible.

The General Services Administration stood up the Cloud Center of Excellence earlier this year to address cloud adoption barriers such as acquisition, workforce education and outreach, standardized service offerings and security. It was co-chaired by Federal Communications Commission Chief Information Officer David Bray.

Vendors present tools and services for protecting the future of data and IoT at the Data Connectors Conference

By 2020, Gartner, Inc. predicts “connected things” worldwide will reach 20.4 billion, and EMC anticipates the digital universe, or the data we create and copy annually, will hit 44 trillion gigabytes (or 44 zettabytes).

Government officials asks industry to improve cyber safety of connected devices.

The national cybersecurity threat level is evolving, and government officials are calling on industry to better secure the internet of things and connected devices as they continue to enter government networks.

Securing devices starts with focusing on each component and subcomponent of the end product when building a critical infrastructure, according to Dean Souleles, chief technology officer for the National Counterintelligence and Security Center in the Office of the Director of National Intelligence.

Customs and Border Protection seeks security through innovation

Today’s frequency of adversarial disruptive cyber attacks has the Homeland Security Department focused on innovative research and development models. For the Customs and Border Protection, network security is the core if its overall mission. 

“Being a CISO, we spend a whole lot of time preparing for something that we really, really hope never comes,” said CBP Chief Information Security Officer Alma Cole at the DHS Science and Technology Cyber Security Showcase and Technical Workshop on July 12 in Washington, D.C.

Cloud enables Air Force and Citizenship and Immigration Services to reallocate resources as they modernize and improve security.

Federal agencies are moving to cloud services to focus less on data centers and infrastructure, and more on application deployment. For U.S. Air Force Deputy Chief Information Officer William Marion II, this means being able to deliver IT at commercial speeds with agility.

The Air Force has a very mobile scale, with 700,000 endpoints on premise requiring efficient IT and cyber support and 2,000 business systems. Its journey to the cloud began two years ago, and it has since adopted five or six main services to deliver as an enterprise across the Air Force.

CIA CIO says moving to cloud was the best decision the agency ever made.

CIA's adoption of commercial cloud services is rocketing the intelligence community’s capabilities and resulting in unprecedented innovation, CIA Chief Information Officer John G. Edwards said at the June 14 AWS Public Sector Summit in Washington, D.C. Edwards went so far to say moving to the cloud “was the best decision we ever made.”

Patching vulnerabilities in a world of machine learning and connected devices.

Rep. Jim Langevin, D-R.I., ranking member of the Subcommittee on Emerging Threats and Capabilities, identified a leading problem facing national cybersecurity today: As technology continues to improve, the networks that need to be protected are only becoming more complicated.

How an organization can adopt DevOps methods for delivering software

The goal of this article is to consider how an organization can adopt DevOps methods for delivering software, while also remaining compliant with Federal Information Security Management Act-mandated information security requirements based on National Institute of Standards and Technology guidance.

101 Constitution Ave NW, Suite 100 West Washington, DC 20001

(c) 2017 GovernmentCIOMagazine. All Rights Reserved.