This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Imagine an Army division conducting a 475-mile air assault, supported by a brigade command post of four vehicles leveraging technologies such as 5G wireless to access cloud capabilities. The layered, unified network is secured, allowing for a forward observer to receive intelligence and call for fire — where warfighters radio in for artillery support — with a shot occurring in under three minutes.
Customs and Border Protection confirmed in a privacy review published earlier this month that it was no longer collecting telemetry data, or smartphone location data, provided by commercial firms. “CBP no longer collects commercial telemetry data owned and maintained by commercial vendors, though it continues to use the commercial telemetry data retained from its past use of vendors,” the privacy impact assessment states.
Every year, the U.S. Intelligence Community publishes a collection of the most alarming threats to the country’s national security. The information included provides a structure and framing for the fight against that which is seen to contest American freedoms and the rights of citizens.
July 30 was National Whistleblower Day and whistleblowers, advocates and government officials gathered on Capitol Hill to celebrate. The National Whistleblower Day event is available to rewatch on C-SPAN , but National Whistleblower Center is also rolling out videos of keynote speeches on its YouTube channel. In a show of bipartisan support for whistleblowers, Senators Chuck Grassley (R-IA) and Ron Wyden (D-OR) each gave remarks at the National Whistleblower Day 2024 celebration on Capitol Hi
Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader
Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,
Military and civilian personnel in Department of Defense Cyber Workforce Framework cybersecurity work roles must meet foundational qualifications by Feb. 15, 2025, as part of a sweeping standardization effort. Many such personnel already have the requisite certifications, which is why they’re first: DOD wanted a “soft opening” for the DCWF, said Matthew Isnor, program lead for the Cyber Workforce Development Office of the DOD CIO, during a TechNet Augusta 2024 panel Wednesday.
The need for freight, and its impact on humanity, can be traced back as far as the Silk Road across. The post Freight Electrification as a Service appeared first on Art of Procurement.
Technologically speaking, society has come a long way since an old lady fell down in her house and couldn’t get up. The Veterans Health Administration is doing its part to put some distance between that memeable late-80s/early-90s image and the current needs of and potential solutions for the aging population it serves. “We’re actually figuring out how to have your house be an integral part of your health,” said Joe Ronzio, deputy chief health technology officer for the VHA.
Technologically speaking, society has come a long way since an old lady fell down in her house and couldn’t get up. The Veterans Health Administration is doing its part to put some distance between that memeable late-80s/early-90s image and the current needs of and potential solutions for the aging population it serves. “We’re actually figuring out how to have your house be an integral part of your health,” said Joe Ronzio, deputy chief health technology officer for the VHA.
On August 22, 2024, Chris Yukins and Tom Daley (DLA Piper) presented to the International Research Study of Public Procurement (IRSPP) group’s tenth workshop , in Charlotte, North Carolina, as part of the NIGP (Institute for Government Procurement) annual conference. Asked to address an emerging “technology” in public procurement, Tom and Chris discussed the rapidly evolving law surrounding “green procurement” (environmentally sustainable procurement).
Industry is increasingly working to make machine learning and artificial intelligence useful to warfighters at the tactical edge in what are known as denied, disrupted, intermittent and limited impact (DDIL) environments. Oracle has begun running ML over its database solution to help soldiers in forward deployments or war zones faced with technical limitations (such as limited connectivity and power) analyze electronic warfare data.
In early August, the National Counterintelligence and Security Center within the Office of the Director of National Intelligence published a new edition of the National Counterintelligence Strategy. The refreshed version includes nine goals split across three pillars, which focus on addressing threats posed by foreign intelligence entities, or FIEs; defending U.S.
Five of the country’s leading software and tech advocacy organizations are urging Senate and House leadership to pass bipartisan, bicameral legislation aimed at improving federal agency oversight and management of software purchases before this congressional term comes to a close. In a letter sent Wednesday and shared exclusively with FedScoop, the tech groups urged Senate Majority Leader Chuck Schumer, D-N.Y., Minority Leader Mitch McConnell, R-Ky., House Speaker Mike Johnson, R-La., and Minori
July 30 was National Whistleblower Day and whistleblowers, advocates and government officials gathered on Capitol Hill to celebrate. The National Whistleblower Day event is available to rewatch on C-SPAN , but National Whistleblower Center is also rolling out videos of keynote speeches on its YouTube channel. During his speech at the National Whistleblower Day celebration on Capitol Hill, Special Counsel Hampton Dellinger reiterated his call for a permanent National Whistleblower Day.
The Department of the Navy’s third attempt to modernize its contract writing system and overall electronic procurement system is on shaky ground. The latest bid, which followed at least two previous failures, is facing similar troubles as earlier projects: incomplete planning, a technology platform with questionable maturity and, maybe most striking, the hubris of the leadership that their current plan will be successful no matter what evidence emerges that tells a different story.
The National Institute of Standards and Technology is again seeking comment on draft guidance for digital identities following updates responsive to the first round of public comments. A second version of the draft guidance, posted Wednesday, provides additional detail for passkeys — or syncable authenticators — and digital wallets after commenters on the first draft asked for those areas to be expanded, according to a release from the agency.
What is Internet Self-Care Day ? It’s a day, celebrated on August 21, when we think about our online behavior and make proactive changes, to improve our well-being. That might run contrary to how we usually use the internet, because many of our automatic daily habits may not be supportive of mental wellness. For instance, it is well-documented that social media can exacerbate mental health problems.
On August 8, the U.S. Department of Justice (DOJ) announced that West Coast Dental Administrative Services LLC and its former owners agreed to pay $6.3 million to resolve allegations of knowingly violating the False Claims Act in connection with improper loans received under the Paycheck Protection Program (PPP). According to the DOJ, “West Coast Dental and six of its affiliated dental practices received seven improper second draw PPP loans and subsequent forgiveness of these loans based on fals
The NIST released three post-quantum cryptography standards that will have major implications for the federal government and private sector as the process of upgrading to post-quantum cryptography begins.
The White House has a new slew of recommendations to consider that the congressional watchdog believes will contribute to the saving of federal funds, improved modernization efforts and better cybersecurity coordination. In a report made public Monday , the Government Accountability Office outlined 37 total priority recommendations to improve how the Office of Management and Budget encourages adequate technology-related practices across the federal landscape.
In today’s intelligence landscape, data is the key to decision advantage. That’s why the U.S. Intelligence Community is placing a heavy emphasis on getting its data strategies and processes right.
July 30 was National Whistleblower Day and whistleblowers, advocates and government officials gathered on Capitol Hill to celebrate. The National Whistleblower Day event is available to rewatch on C-SPAN , but National Whistleblower Center is also rolling out videos of keynote speeches on its YouTube channel. During his speech at National Whistleblower Day, Boeing whistleblower Ed Pierson, the Executive Director of The Foundation for Aviation Safety , an aviation industry watchdog group, reve
People imagine large organizations such as the Department of Transportation when they think about who needs to utilize Zero Trust. What they don’t realize is that a smaller entity can make for a profitable attack, even a gateway to those larger targets. In this week’s Feds At The Edge podcast, Nick Graham, Senior Technical Sales Engineer of Civilian Sales from RavenTek offers some solutions that smaller institutions should prioritize in their transition to a safer cybersecurity posture.
Collecting data from inside a hurricane can feel like sticking toothpicks in a donut. At least that’s how Joseph Cione, lead meteorologist for NOAA’s Hurricane Research Division, puts it. For decades, the National Oceanic and Atmospheric Administration has used small tubular devices with parachutes attached, known as dropsondes, to gather information about the storms.
Synergy Business Innovation & Solutions has appointed J.C. Chidiac, former ICF senior vice president, as CEO and Byron Caswell as chief strategy officer. In their new roles, Chidiac and Caswell will aim to leverage their experience in digital transformation to advance Synergy’s technological systems, the Reston, Virginia-based company announced Thursday.
On August 23, the U.S. Securities and Exchange Commission (SEC) announced whistleblower awards totaling more than $99 million. In one award order, the SEC awarded more than $98 million to two whistleblowers whose disclosures contributed to a successful SEC enforcement action as well as successful related actions. In a second award order, the SEC awarded $1 million to whistleblowers who likewise voluntarily provided original information which contributed to the success of an enforcement action.
The General Services Administration recently announced the first round of awards for Oasis+, with the Total Small Business Pool recognizing 1,383 awardees. Notably, 180 of these were joint ventures from the SBA Mentor-Protégé Program (MPP), providing more evidence that companies leveraging combined capabilities, resources and past performance are well positioned to win federal contracts.
Leaders of the National Institutes of Health agency responsible for a $50 billion governmentwide IT services acquisition vehicle are “confident” that the contract will be awarded before the new expiration date for its predecessor next spring. The two top officials for the NIH Information Technology Acquisition and Assessment Center told FedScoop in an interview that the agency and the Department of Justice are currently working through challenges to the contract, CIO-SP4, in the U.S.
Serco has secured a $323 million contract to manage the facility repairs and upgrades to the backup power plant at Pituffik Space Base in Greenland in support of the U.S. Army Corps of Engineers and Space Force missions.
On August 15, the Department of Justice (DOJ) announced that a California Law firm, The Bloom Firm, and its senior managers, Lisa Bloom and Braden Polloc, agreed to pay $274,000 to settle False Claims Act allegations. The government alleges that the firm knowingly submitted false information to support a loan forgiveness application for the Paycheck Protection Program (PPP).
Tom Lash assumed his current role as CEO of Vibrint in February 2023, bringing three decades of experience in the technology sector and a long history of serving national security and intelligence-focused clients to the company. At Vibrint, he is responsible for driving innovation and cultivating technology partnerships to advance the company’s growth strategy.
As enterprises increasingly rely on real-time data processing and automation, edge computing has become vital to modern IT infrastructure. Nearly 80% of organizations now classify three-quarters of their edge workloads as business-critical, according to recent research published by International Data Corporation (IDC), a global market intelligence, data and events provider.
Palantir Technologies has appointed Mike Gallagher, a former Wisconsin congressman, as head of its defense business. Alex Karp, Palantir CEO, expressed confidence that Gallagher’s “unique talents,” which helped shape government policy against U.S. adversaries, will play a vital role for the company and its mission partners, according to a post on Palantir’s LinkedIn page.
Thursday, September 12, 2024 | 2:00PM EDT | 1 Hour | 1 CPE In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. More than 133 million records were exposed or impermissibly disclosed. That’s just one risk in healthcare ecosystems. The dangers extend beyond that: every hospital bed is connected to the internet.
Mentor-protégé arrangements provide a great way for small businesses to win federal work along with their larger business mentors. The popular program goes back decades. But mentor-protégés aren’t guaranteed to win. In one recent protest case, the problem was the buying agency wasn’t convinced the the protégé could actually do the work. Haynes Boone procurement attorney Dan Ramish joined the Federal Drive with Tom Temin for more details.
Customs and Border Protection did not adequately prepare for potential technological problems within its CBP One app, a mobile platform designed to help schedule appointments at U.S. ports of entry, according to a Department of Homeland Security inspector general report published this week. The agency failed to consider major issues with the functionality of the app, including challenges related to language access, appointment availability, and technological infrastructure, DHS’s Office of Inspe
NetCentrics has appointed Steve Wieland as its new chief technology officer and vice president of technology and solutions. In a Tuesday LinkedIn post, the new CTO said he started the new job this August, coming from his most recent stint as division chief of future operations and plans at the U.S. Cyber Command.
Monday, September 16, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Federal agencies’ systems are targeted by hostile interests all the time, whether it’s through a vulnerability in their networks or through a third-party product. The complexity and dynamism of the digital glass houses built on cloud platforms require significant time and effort to rebuild after a breach or a ransomware attack.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content