This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Federal government cybersecurity breaches rose by 453 percent between fiscal years 2016 and 2021, according to the Government Accountability Office. To combat and overcome these threats, federal IT administrators can use IP packet capture to examine network traffic for security threats using Microsoft Network Monitor (Netmon).
The IoT Cybersecurity Improvement Act of 2020 required the National Institute of Standards and Technology and the Office of Management and Budget to develop guidance for securely procuring IoT — networked technology and devices typically connected to physical objects like buildings, vehicles and other infrastructure.
The department will hold accountable contractors that knowingly overcharge the United States to enrich themselves,” said Principal Deputy Assistant Attorney General Brian M. The United States deserves fair prices and accurate information from GSA contractors,” said GSA Deputy Inspector General Robert C.
The Environmental Protection Agency lacks a complete and accurate inventory of its information systems and software asset management data, according to the agencys Office of Inspector General. Additionally, senior information officials and relevant IT personnel should be made aware of that designation.
On February 26, the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) issued an announcement addressing Senator Chuck Grassley’s (R-IA) concerns regarding the issuance of The Prohibited Discourse of Unclassified, Sensitive Information Without Proper Authorization memo.
Sikorsky Aircraft and the Defense Department have been arguing in court for the past 17 years, over the company’s compliance with cost-accounting standards. So, what happens, if you’ve got a contract that’s subject to the full cost accounting standards, you have to submit a disclosure statement. Zach Prince Yes.
And the oversight and accountability of subcontracting efforts by prime contractors is getting more scrutiny. The Government Accountability Office’s annual report to Congress on the state of bid protests always is fascinating. These are the latest among a host of story lines in the federal acquisition community.
Founder & CEO of Select GCR, Jason Bortz featured on Spotlight Digital Network with Damon Roberts. That’s why Founder and CEO of Select GCR , Jason Bortz has been busy lately doing interviews across the country with a variety of news programs like Fox Business Networks Worldwide with Kathy Ireland and more!
It calls on the Defense Department and the Government Accountability Office to develop a plan to test a novel idea: having companies that lose bid protests to repay DoD for legal costs. The post Coming to a contract protest near you, loser pays legal fees first appeared on Federal News Network. Chris Griesedieck: Right.
Laura Stanton is the assistant commissioner in the Office of Information Technology Category (ITC) in the Federal Acquisition Service at GSA. The Government Accountability Office found in January that 10 vendors, including Microsoft, Adobe, Salesforce and Oracle accounted for 73% of all licenses purchased by the 24 agencies reviewed.
The United States relies on contractors such as Lockheed Martin to provide accurate, complete, and current information, including pricing data, when negotiating contracts with the government, said Acting U.S. We will pursue contractors that knowingly misuse taxpayer funds. Attorney Abe McGlothin, Jr, for the Eastern District of Texas.
The CIO-SP3 and CIO-SP3 Small Business extension requests are currently being routed for approval,” Ricky Clark, deputy director of the National Institutes of Health’s Information Technology Acquisition and Assessment Center ( NITAAC ), said in an emailed statement to FedScoop. Federal News Network was first to report the news.
government continues to deal with the aftermath of the CrowdStrike IT failure Friday that created major issues for businesses around the world and impacted many federal institutions, ranging from the agency that handles critical immigration services to a network used to help facilitate organ transplants. An individual employed within the U.S.
The ATF memo fails to explicitly inform ATF employees of their Constitutional and statutory right to make protected disclosures of wrongdoing and misconduct to Congress, inspectors general (IG), and the Office of Special Counsel (OSC),” wrote Grassley. Grassley claims that this omission violates the Whistleblower Protection Act.
In his speech, Grassley highlighted different examples of how whistleblowers have provided his office with information to help increase transparency and accountability within the federal government. “The task of supporting whistleblowers doesn’t start and stop with this very day, every year, that we honor whistleblowers.
Carahsoft Technology has agreed to utilize its reseller network and government procurement vehicles to offer CodeLock 's compliance, accountability and security software to government and public sector customers.
For instance, the departments of Justice and State, as well as the Centers for Disease Control, are trying it out as a way to address voluminous Freedom of Information Act requests. He has been in numerous leadership roles in the private sector for over 25 years, spanning accounting, finance, technology & operations management spheres.
The goal of CMMC is to verify whether defense contractors are following cybersecurity requirements for protecting critical defense information. adversaries to steal sensitive but unclassified data from their networks. CMMC provides the tools to hold accountable entities or individuals that put U.S.
Cyber Command would use contractor personnel to perform “critical CMF work roles,” including duties related to network operations, cyber tool development, and exploitation analysis. Of particular importance, the bill would require a three-year pilot program under which U.S. CMF Occupational Resiliency.
Featured Speakers: Nate Fontaine × Nate Fontaine Deputy Chief Information Security Officer Nate Fontaine started his professional career as an F-16 and F-22 Crew Chief in the United States Air Force, simultaneously graduating from Christopher Newport University and Colorado Technical University. Immigration and Customs Enforcement.
Participants can earn up to 3 CPE credits in Information Technology.* Additional Information: Prerequisites & Advance Preparation : None required. Carahsoft is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education of the National Registry of CPE Sponsors.
Securities and Exchange Commission (SEC) issued a $12 million award to three joint whistleblowers who voluntarily provided the agency with original information that led to a successful enforcement action. Even where an investigation is already open, whistleblowers may contribute by providing new information about misconduct.”
When considering the implementation of emerging technologies, federal agencies should document changes in statutes, provide the public with information about their efforts and establish clear communication with Congress and other relevant stakeholders, the Government Accountability Office said in a report released Thursday.
The SEC thus charged John Deere with violating the recordkeeping and internal accounting controls provisions of the FCPA. This action is a reminder for corporations to promptly ensure newly acquired subsidiaries have all the necessary internal accounting control processes in place.”
As customers move more data to the cloud, it becomes increasingly important to take necessary precautions and measures to prevent sensitive information from unauthorized access or use. Prepare your AWS accounts – Prepare your AWS accounts by creating the necessary accounts and configuring the required settings.
They further explain that under current internal and governmental oversight regimes, AI companies have “weak obligations to share some of this information with governments, and none with civil society.” Thus, the group does not believe that the AI companies can be relied upon to share this information voluntarily.
The department is committed to holding accountable those who engage in kickback arrangements that undermine the integrity of federal healthcare programs.” Boynton, head of the Justice Department’s Civil Division.
Exclusive reporting by Whistleblower Network News reveals whistleblowers’ critical role in successful enforcement actions by the U.S. These whistleblower disclosures allowed FWS to hold wrongdoers accountable for crimes that otherwise would have gone undetected. Fish and Wildlife Service (FWS) over the past four years.
Matthew Decker, the former chief information officer for Penn State’s Applied Research Laboratory, is set to receive $250,000 as his share of a False Claims Act (FCA) settlement stemming from his qui tam whistleblower suit. Department of Justice (DOJ) announced the $1.25 million settlement with Penn State on October 22.
The impact level is based on National Institute of Standards and Technology (NIST) 800-60r1 , which outlines how to map information and information systems to various security categories. AWS also provides documentation within AWS Artifact , a central resource for compliance-related information available in the AWS Management Console.
So for example, there’s no single place a contracting officer can go to find information about existing government wide contracts. At the Small Business Administration, BICs account for 45.6% The post Ten years later, agencies still making gains on category management first appeared on Federal News Network.
According to the Government Accountability Office, the Social Security Administration has spent roughly $62 million on the service but has taken in just $25 million in user fees, putting it off pace to meet the law’s requirement to fully recover the service’s total cost by the end of fiscal year 2027.
Office of Special Counsel (OSC) announced a policy proposal designed to increase transparency and accountability around federal employee whistleblower cases. Promoting transparency around whistleblower disclosures is a welcome step that should help advance accountability.”
MKSS has led transparency and anti-corruption movements across India, including for the Right to Information, minimum wage, protection for gig workers, and more. The post Nikhil Dey appeared first on Whistleblower Network News. Listen to this important episode on Spotify , Apple Podcasts , Google Podcasts , or Amazon.
On August 8, the Commodity Futures Trading Commission (CFTC) announced a $1 million whistleblower award issued to an individual who voluntarily provided original information which led to a successful enforcement action connected to digital asset markets.
Three years ago, chief information security officers couldn’t go anywhere without hearing about zero trust. If our adversary can poison that data, well, we’re going to start getting the wrong information back out from our artificial intelligence. It’s going to say, ‘Day is night, night is day. Jennifer R.
Whistleblower advocacy groups, including National Whistleblower Center (NWC), The Anti-Fraud Coalition (TAF) and Government Accountability Project (GAP), have met with DOJ officials and sent letters detailing the proven best practices of successful whistleblower award programs. According to Acting Assistant Attorney General Nicole M.
Introduction of the radio was just as important in World War I, while radar and sonar – other forms of conveying crucial information – played an important role in World War II. For instance, 5G networks must have state-of-the-art security and encryption, since they will be targets of cyber attacks, espionage and data breaches.
There are a lot of points of entry now,” said Raghurama Pantula, Director of Information Security for Karsun Solutions, a modernization company that applies innovative approaches to help achieve agency missions. “So, Networks: Maintaining network segmentation while allowing authorized communication between components.
billion in federal contracts in fiscal 2023, with the Defense Department being the company’s biggest customer, accounting for more than $653 million, according to USAspending.gov. The post FBI, DCIS raid Carahsoft headquarters first appeared on Federal News Network. Carahsoft won more than $1.4
When they buy technology, cities and counties will often face multiple issues, says Dean Cunningham , segment development manager, Public Safety at Axis Communications , a company that produces network cameras, access control systems, network audio devices and other IP networking solutions for physical security and video surveillance applications.
But the push toward standardization must also take into account that people do their best work when they have the best tools. Certificates will be e-mailed to registrants.
According to the DOJ, Insight Global understood that the personal health information of contact tracing subjects needed to be secure but it failed to do so. Failure to do so can compromise sensitive information of individuals and the government. Boynton, head of the Justice Department’s Civil Division.
The agreements required the clients to keep confidential the settlement, all underlying facts relating to the settlement, and all information relating to the account at issue. In addition, even though the agreements permitted clients to respond to SEC inquiries, they did not permit clients to voluntarily contact the SEC.’
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content