“There is no such thing as absolute privacy in America.” That’s what FBI Director James Comey said in a counterattack on Silicon Valley’s stance on encryption. […]
The Pentagon’s latest buzz phrase is Identity Activities, which means the Pentagon wants to employ data analysis tools that will leverage biographical, biological, behavioral, and reputational data inputs to help the military determine the identity of a person they encounter on the battlefield and whether that person poses a threat. […]
Major changes in the cyber threat landscape during the last few years have forced the NSA to embrace a new reorganization strategy that officials argue is urgently needed to defend the nation from an onslaught of state-sponsored hacking attacks. […]
The TSA last week discovered in a carry-on bag a loaded gun that was constructed of parts made with a 3-D printer….The Veterans Administration is actively pondering what it will require to manage transitioning from its legacy electronic health record, known as VistA, to a commercial EHR….And who’s keeping track of that teleworking equipment at the U.S. Patent and Trademark office? […]
Bank regulations focusing on “too big to fail” have ignited a flurry of mergers and acquisitions in the financial industry, which in turn has created a legacy system vulnerability problem that may be responsible for the majority of data breaches reported to date….And over at DoD, as defense contract obligations reached record highs in 2008, the size of the acquisition workforce in the Defense Department actually shrunk. […]
Archives
- April 2017 (3)
- March 2017 (4)
- February 2017 (4)
- January 2017 (3)
- December 2016 (3)
- November 2016 (3)
- October 2016 (3)
- September 2016 (4)
- August 2016 (5)
- July 2016 (4)
- June 2016 (4)
- May 2016 (4)
- April 2016 (4)
- March 2016 (5)
- February 2016 (4)
- January 2016 (4)
- December 2015 (3)