This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
A lack of robust information sharing can lead to “a murky information environment, making it difficult for governments and industry to work together to combat ransomware at scale,” according to a report from the Institute for Security and Technology released in April.
The Department of Homeland Security is seeking information about technology that could potentially assist first responders, according to a new procurement posting. Through the SAVER program, the NUSTL assembles information that can guide DHS technology purchases.
Information is combat power. The future state for me is where the warfighter is given decision-ready information from which to act and doesn’t have to fuse it at the tactical edge. That information's coming at us very quickly, a lot of information… “That information's coming at us very quickly, a lot of information…
The wealth of information available to government agencies is often locked in these forms due to a lack of manpower to process and analyze them for correlations and relationships. Unlocking this data requires significant work due to the requirements for data entry, validation, and proper routing and categorization of the information.
The Advanced Research Projects Agency for Health is seeking information about how autonomous artificial intelligence systems, known as agentic AI, might be used in the health care space. ARPA-H is asking for information before 4 p.m. Meanwhile, Salesforce is offering recently announced autonomous systems for sales. Eastern time on Nov.
The National Institutes of Health has awarded 17 companies positions on the third iteration of the potential five-year, $1 billion Public Information and Communication Services, or PICS, contract.
The journey to Windows 10 in 2019 was rocky for a number of federal agencies, especially given the looming deadline for Windows 7 end-of-support in early 2020. FedTech reached out to federal IT leaders and asked them what they learned from that experience that might apply to the move to Windows 11. We talked to Maj. Jacqueline D.
These systems provide a wealth of data and insights for tackling environmental challenges, driving scientific discovery, and supporting informed decision-making across numerous sectors. Geospatial data and analytics: Delivering sophisticated tools for interpreting, processing, and visualizing complex Earth-related information.
The federal government collects and produces almost unimaginable amounts of information. And that’s just static information; every day there’s another report or white paper or written testimony that must be absorbed. The — 914 million unique files.
Using digital signage to display public information in prime locations adds immense value to federal government services. Displays in office lobbies and other common areas can also provide scheduled, easily updated information for visitors.
Direct attacks on users could flood headsets with information designed to cause motion sickness or disorientation. Or, attacks might clutter displays with virtual objects that cause users to misinterpret critical information and compromise military operations.
Federal agencies have long followed the National Institute of Standards and Technology’s Risk Management Framework for Information Systems and Organizations to help agencies select the appropriate safeguards related to cybersecurity, privacy and supply chain risk management.
Predictive AI can strengthen agencies cybersecurity resilience and will likely become more important than generative AI because larger data sets will be at its disposal to anticipate attacks and trends, said Defense Information Systems Agency CTO Stephen Wallace at the 2024 Rubrik Public Sector Summit in October.
The National Institute of Standards and Technology announced an algorithm that could serve as a second line of defense to ensure encrypted information stays encrypted in the face of an attack from a future quantum computer. That concept has been deployed for decades in information security, including for NASA missions.
At the same time, end users can be the weak link in information security if they don’t have the proper training and don’t understand how important their contribution can be. Government IT teams can take specific steps to foster a culture of information security through education and preparedness exercises and by leveraging technology.
Information collected over decades includes isolated and duplicate data that limits visibility across agencies, many of which operate under their own policies. Let’s examine some common beliefs about cloud migration to determine which might be true and which might be misconceptions.
In the world of classified information, you need people on the inside — actual humans who can find the best information and get it to you efficiently and without a lot of drama, people who have proved to be trustworthy and excellent at their jobs.
“We have so many satellites and ground-based observation sites collecting data from different sensors in different formats,” explains Sid Boukabara, former senior scientist with NOAA’s National Environmental Satellite, Data, and Information Service. That information is highly valuable, he adds, “but it gets really…
With the most recent Federal Information Security Modernization Act report cataloging 11 major incidents among government agencies in fiscal 2023, there is a clear need to continue improving overall cybersecurity. A key component is the federal identity credential and access management program created in 2009.
The Department of Defense should look beyond existing communication protocols — the Secret Internet Protocol Router Network and Non-classified Internet Protocol Router Network — toward commercial solutions that support secure information sharing, say comms experts.
Instead, you’ll share your information digitally with the officer, who will hopefully give you a warning and advise you to fix that broken taillight. There are an estimated 311 million smartphone users in the United States, doubling as video cameras, calculators, GPS guides, flashlights, e-readers and, soon, driver’s licenses.
Most federal officials understand the transformative impact AI can have on their agencies’ missions, from national security to informing citizens. The cloud computing company’s GPT-in-a-Box 2.0 and AI Partner Program, both announced in May, aim to help agencies launch secure, sustainable use cases.
the FAR must update definitions related to specific types of organizational conflicts of interest, including unequal access to information, impaired objectivity, and biased ground rules. As well as add more procedures to require contractors to disclose information relevant to potential organizational conflicts of interest.
But the talents needed to inform the DevSecOps pipeline aren’t always readily available. To that end, Department of Defense branches have leaned heavily into DevSecOps, a practice that encourages collaboration among development, security and operations organizations to speed software production.
Leidos has been awarded three contracts worth over $30 million in total by the Defense Information Systems Agency to continue enhancing and expanding the Department of Defense Network, or DODNet, under the Defense Enclave Services, or DES, program. billion indefinite-delivery/indefinite-quantity DES contract […]
While focused on the Department of Commerce, the document could end up being useful to other agencies as they also work to get their own information ready to be used with AI tools. “No No one has created guidance like this before,” Houed said during the panel discussion. That comment period closed in July.
For contractors in the construction and infrastructure sectors, staying informed about trends, technologies, and opportunities is essential to securing federal contracts.
It also allocates about $179 million for research into what the NDAA calls “Next Generation Information Communications Technology (5G).”… The NDAA requires the Defense Department to develop private 5G networks at military bases and other DOD facilities.
The 2020 NDAA language arose from a Congressional fear that SBA JVs, many in the Mentor-Protégé Program, cannot obtain a facility clearance prior to submitting a proposal as EEDs can only be issued when a contractor has a need to access classified information. The Joint Notice clarifies that this includes JVs and any partners to the JVs.
Where now when we have it in a database, in an ability to capture and use it, you have a speed to information, a speed to result that did not exist before. Charlotte Phelan: Well, I think it gives you much better management because you have access to the collective data, which then is transposed into information.
This year marks the 20th anniversary of the pivotal E-Government Act of 2002, which provides guidelines on how government agencies use IT to handle personal information.
Now in its 20th year, the Department of Defense Intelligence Information System Worldwide Conference is the largest IT gathering focused on the defense and intelligence communities. DoDIIS, sponsored by the Defense Intelligence Agency, takes place in Portland, Ore.,
According to the letter , the two institutions agreed to work together on objectives including raising “awareness of space-based technologies that help enhance national information and communications technology infrastructure” and studying the sustainability of community networks in the Philippines. “As
As director of the Defense Information Systems Agency, Air Force Lt. The Defense Department’s sprawling IT architecture includes at least 15,000 networks used by millions worldwide. Creating a zero-trust network for a system that complex is no small feat.
Agencies are increasingly turning to next-generation security information and event management systems because the success of their cyber workflows relies on holistic visibility of their IT environments.
A information sheet explains how the federal zero-trust strategy, specifically its user pillar, builds upon the federal identity, credential and access management (FICAM) enterprise approach to designing, planning and executing a common segment architecture.
Top intelligence officials stressed the importance of partnerships — whether the collaboration be with other agencies, allies, academia or industry — in talks Monday at the 2023 Department of Defense Intelligence Information System Worldwide Conference in Portland, Ore. “We’re talking about leveraging emerging technologies,” said Lt.
million, enabling the DOJ’s Executive Office for Immigration Review to modernize a legacy case management system and backend databases that share information with Department of Homeland Security agencies, and aiding OPM’s move away from legacy IT to reduce costs and provide an enhanced experience for users. DOJ will use $1.34
Not everyone who needs to access a federal information system is PIV-eligible,” says Grant Dasher, architecture branch chief in the Office of the Technical Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency.
To see the impact of the Federal Information Technology Acquisition Reform Act, all you need to do is look at the numbers — and the letters. FITARA’s semiannual assessment ranks agencies on how well they meet the requirements outlined in the law, including data center optimization, enhancing CIO authority, cybersecurity and more.
About four years ago, we looked at how we were delivering all operational services to the lab,” says Stu Hannay, CIO and senior director of the lab’s Business Information Services Directorate. “We
Ben Gianni, GDIT General Dynamics Information Technology announced a new strategic collaboration agreement with Amazon Web Services to drive digital modernization and advance government missions.
Army Corps of Engineers has started seeking information on potential vendors that could provide remedial action construction, or RAC, support for the Iron King MineHumboldt Smelter, or IKM-HS, Superfund Site in Dewey-Humboldt, Arizona.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content