-
Army fills in details on micro drone RFI
March 31, 2016 | NewsFollowing a request for information asking for Soldier Borne Sensors for individual soldiers, military leaders addressed some configuration and procurement particulars.
-
Lockheed Martin expands its data security role within VA
| NewsLockheed Martin is expanding its expanding its data security role in the Million Veteran Program as it helps build one of the world’s largest genomic databases.
-
Using the NSA Intrusion Lifecycle to bolster security
| NewsAlthough enterprise security will never be perfect, the NSA lifecycle can give defenders a model for mapping the appropriate mitigation to each step in the intrusion process.
-
Lottery system hacked in Connecticut
| NewsA vulnerability in instant lottery machines was exploited to issue a disproportionate number of winning tickets.
-
SideStepper exploit targets iOS MDM security
| NewsThe vulnerability lets attackers use hijacked devices enrolled in mobile device management programs to launch man-in-the-middle attacks, according to Check Point Software.
-
Study: IT underpins state and local investments
March 30, 2016 | NewsA recent report by Onvia describes the fastest-growing segments of government services.
-
Let the cloud buyer beware
| NewsCloud computing decisions must be based on the intended functionality, user base, data sensitivity and other organizational characteristics.
-
GAO: Better project management can improve vehicle safety defect oversight
| NewsThe Government Accountability Office suggested improvements the National Highway Traffic Safety Administration can make to improve the effectiveness of its system to help it identify and investigate potential automotive safety risks and defects.
-
HHS issues BPA for Salesforce
| NewsThe agencywide blanket purchase agreement gives the Department of Health and Human Services cost-effective access to the Salesforce customer relationship management tools.
-
DHS stands up public-private cyber info sharing platform
| NewsAutomated Indicator Sharing allows industry and government to exchange cybersecurity threat information.