Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
In an effort to provide a better environment for commenting, we have changed our comment platform. In order to comment on a story, you will first need to create a Disqus account if you do not already have one. It's easy! Sign up for an account below by clicking in the "Leave a message" field and then clicking on the blue Disqus icon. Alternatively, you can now comment using your Facebook, Twitter or Google accounts.
Federal News Radio understands how important anonymity is to some commenters. Like our previous platform, our new system allows users to identify their comments with a screen name (instead of their first and last name) if they so choose. Find more information about creating a screen name and other frequently asked questions about Disqus here.
Our comment policy itself has not changed. Federal News Radio encourages users to express their opinions by posting comments that have a positive and constructive tone; are on topic, clear and to-the-point; and are respectful towards others and their opinions. Our goal is to maintain a civil dialogue in which readers feel comfortable. Federal News Radio reserves the right to remove comments and block users that do not follow these criteria.comments powered by Disqus
Correction: Homeland Security-Confirmations story
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.
The Homeland Security Department has awarded a $145 million contract for a series of border security towers to be built along the Mexican border in Arizona.
In times of constrained budgets, agencies are cutting and consolidating services to save money and resources. Could it be the key to transforming government? A new report looks at what three agencies are doing right.
In his first appearance before House overseers, Jeh Johnson, the DHS secretary, said employee morale is among his top priorities, but didn't say how he would address it. Johnson said he's working to fill top leadership positions on a permanent basis. DHS has a vacancy rate at top positions of 38 percent.
Rep. Jeff Duncan releases a discussion draft of a bill to add more discipline and oversight to the Homeland Security Department's acquisition process.
Departments have a week to finalize their plans to implement information security continuous monitoring by 2017. State and DHS already are heading down the new cyber path, and are excited to take advantage of the standard suite of products and services under the CDM contract.
Homeland Security cancels plan for private firm to give access to license plate information
Rafael Borras, undersecretary for management at the Homeland Security Department for the last four years, who recently left DHS to return to the private sector, said the Homeland Security Department needs a tactical, sustained effort to improve employee satisfaction. He said that kind of effort has helped change the way DHS oversees and implements IT programs.
Rafael Borras spent the last four years as the undersecretary of management for the Homeland Security Department before leaving Feb. 7. He said his goal was to make DHS more business-like by making it easier to apply data to decisions. Under Borras' leadership, DHS launched the Management Cube and received its first-ever clean financial audit opinion.
DHS ICE issued a solicitation looking for a vendor to provide technology to let law enforcement officers hook into the National License Plate Recognition Database.
NIST led the year-long effort to develop the Framework for Improving Critical Infrastructure Cybersecurity. Agencies now must review regulations to ensure alignment with the framework. DHS also launches a new voluntary program that will offer access to a variety of federal resources to help companies improve cybersecurity.
Agency officials said Thursday that they will switch from a custom-built to a commercial-off-the-shelf approach to modernize TECS, a mainframe system that has been operating for more than a quarter of a century. ICE spent more than $60 million before deciding to change directions after realizing the custom-built approach wouldn't work.
Sen. Tom Coburn's (R-Okla.) report on cybersecurity and critical infrastructure in the federal government examined more than 40 inspector general audits and revealed gaping holes in the security of agencies' systems.
Phyllis Schneck, the deputy undersecretary for cybersecurity in the National Protection and Programs Directorate at DHS, said the department's goal is to further the trust relationship with industry around sharing and understanding cybersecurity threats.
February 6, 2014
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
The Government Accountability Office Monday denied the protest of ICF International, saying DHS' "evaluation was reasonable and in accord with the terms of the solicitation."
Early pilots in DHS information sharing project appears to show that bureau-level IT systems built decades ago can share information with one another, and also protect against data privacy problems.
New CIO at EPA; GSA gets another OMB detailee.
Last month the Homeland Security Department published its updated National Infrastructure Protection Plan, a governmentwide framework for securing critical infrastructure on a wide scale. The aim of the updated plan is to make all sectors of critical infrastructure more "resilient" -- better able to absorb and recover from natural disasters, terrorist attacks, cyber intrusions and other adverse conditions.