Employees Wanting Mobile Access May Get it —As 5G Services Come Into Play Employees Wanting Mobile Access May Get it —As 5G Services Come Into Play
Employees Wanting Mobile Access May Get it —As 5G Services Come Into Play
GDIT Recruitment 250×250
Vago 250×250
USNI News: 250×250
gdit cloud 250×250

Sign Up For Our Newsletter

Fields marked with an * are required

Stay informed!
Get GovTechWorks delivered to your inbox

Tom Temin 250×250
GM 250×250
GEMG 250×250

Latest Articles

Automated License Plate Readers on the U.S. Border

Automated License Plate Readers on the U.S. Border

U.S. Customs and Border Protection are planning to upgrade automated license plate readers to help monitor traffic on both the northern and southern borders. As it turns out, the recognition technology is reaping rewards and helping reduce cross-border crimes.

Wanted: Metrics for Measuring Cyber Performance and Effectiveness

Wanted: Metrics for Measuring Cyber Performance and Effectiveness

Intense worries about cybersecurity mean system owners are stacking up cyber tools to help protect their organizations, often duplicating features and capabilities in the process. The problem: There’s no sure way to measure the effectiveness of one tool over another.

Securing Health Data Means Going Well Beyond HIPAA

Securing Health Data Means Going Well Beyond HIPAA

The National Health Information Sharing and Analysis Center (NH-ISAC) warns that health providers have focused on complying with the data privacy concerns embodied in the Health Insurance Portability and Accountability Act (HIPAA) – yet failed to pay enough attention to data integrity and security.

New Framework Defines Cyber Security Workforce Needs

New Framework Defines Cyber Security Workforce Needs

Today’s shortage of skilled cybersecurity professionals won’t end overnight, but the answer to solving the shortage may be here. It’s the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. By defining a common language to describe the skills, knowledge and requirements needed to fill each type of cyber job, the framework provides a baseline for understanding which can be shared by employers, educators and workers alike.

Upcoming Events

Homeland Security

Why Modernization Is Key to National Cyber Strategy

The president’s executive order on cybersecurity emphasizes systems modernization and cloud as a first step toward emphasizing protection of data rather than the network itself.

What's New

Proactive Resilience: The Future of Cybersecurity

Today’s state of the art in cybersecurity is operational resilience – the ability to keep operating in the midst of a disruptive attack. Tomorrow’s state of the art is what Carnegie Mellon CERT’s Summer Fowler calls “prosillience” – the ability to anticipate and adapt before disruptions strike. Here’s how we’ll get from now to then.

Border Security Concerns Aren’t Limited to the South

Solving the southern border will affect security in other parts of the country, as well. Re-Locatable Video Surveillance Systems offer the kind of flexibility the U.S. Border Patrol needs to put resources wherever they’re most needed.

GDIT Recruitment 600×300

Talking Tech Videos

What We’re Reading

Trump Not Rushing to Find a Permanent Head for DHS

A month after former Homeland Security secretary John Kelly decamped for the White House, President Donald Trump has yet to formally interview any potential candidates to replace the retired general as the head of the department.
That’s the latest from the U.S. Government Accountability Office. In a recent report GAO declares that a decade’s worth of effort to pare the use of SSNs in government has had only “limited success.”

GAO To Agencies: Stop Using Social Security Numbers For Everything

Federal agencies continue to over-collect, over-use and over-display Social Security numbers, leading to the an unnecessarily high risk of identity theft.

That’s the latest from the U.S. Government Accountability Office. In a recent report GAO declares that a decade’s worth of effort to pare the use of SSNs in government has had only “limited success.”

GIS, Mobile-Alert Tech Shine During Eclipse

Cities, counties and states along the path of totality during the historic eclipse turned to data to ensure that the millions of people who followed that track stayed safe. Governments used GIS and messaging systems to alert area residents and tourists to traffic congestion, road closures and lodging information and notify first responders of needs for emergency response.

The Defense Department Will Soon Use More Secure Email

The U.S. Department of Defense will soon start sending more secure emails.
The Defense Information Systems Agency (DISA), the body in charge of the Pentagon’s email, said it plans to enable stronger encryption on all emails by July 2018.

In Quest to Replace Common Access Card, DoD Starts Testing Behavior-Based Authentication

A year after then-chief information officer Terry Halvorsen first publicly floated the idea of killing DoD’s Common Access Card in favor of a collection of more flexible authentication technologies, the Pentagon is beginning to test drive at least one of the potential replacements for the CAC.

Last week, the Defense Innovation Unit-Experimental reached an agreement with Plurilock Technologies, a Victoria, British Columbia-based firm that holds several patents on behavior-based authentication (or, “behaviour-based,” to our friends to the north).

Local Governments Focus on Cybersecurity After Attacks

Terri Bettinger paid close attention to the recent cyberattacks on the websites of Ohio government agencies, banks and other businesses. She hoped to learn lessons to better defend the information she oversees.

Bettinger is the chief information officer for Franklin County and head of its Data Center, which collects, stores and protects government data from property tax bills to court and medical records. She knows the system will be hacked.

DHS needs better information security practices, audit says

The Department of Homeland Security needs to up its game on information security, according to an audit released last week.

Private sector auditor KPMG conducted after-hours walkthroughs of employee workstations in the department’s Office of Financial Management and the Office of the Chief Information Officer, and found sensitive information — like passwords — left out and unattended.