PortfolioStat: Rigorous program reviews similar to system integrator best practices

Systems Integrators must put quality first or they will fail. Every integrator I know has processes in place to ensure program success. The best include rigorous reviews early in program life to help program managers succeed. Rigorous review processes check program documentation, personnel training, schedules, budgets, risks, and overall plans. Reviews also include input from […]

Innovate, Deliver, Protect and Analyze, the Path to Ideal IT

Steven VanRoekel gave an excellent keynote on Wednesday at the FOSE conference. Mr VanRoekel is a former Microsoft executive who has been in the Federal Government since 2009. He outlined the steps that he is pushing as the Federal CIO to improve IT throughout the government. He highlighted the pervasiveness of mobile technology, and how […]

Facebook used as a billboard for malware, Officials and industry preparing for a more mobile government and more

Here are the top cybersecurity news and stories of the day. Facebook used as billboard for malware – “A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground.” This is a bold move by the […]

Rumored Cybersecurity Executive Order Draft, Federal Agencies Not Monitoring Employee Devices, and More

Here is today’s federal cybersecurity and information technology news: The White House is circulating a draft of an executive order on cybersecurity which sources say would establish a voluntary program where companies operating critical infrastructure would choose to meet cybersecurity best practices and standards established with guidance from government. More here. A new survey shows that while […]

Federal Government Expanding API's, FBI Seizes 3 Android App Sites, and More

Here is today’s federal cybersecurity and information technology news: As part of  Chief Information Officer Steven VanRoekel’s digital strategy to make application programming interfaces “the new default in government,” U.S. foreign assistance payments, nuclear reactors’ daily event reports and a national sex offender registry will soon be released with API’s to allow automatically updated streaming datasets. More here. The leader of the Chicago […]

Flame Cyber Espionage, U.S. Military Chip Backdoor, and More

Here is today’s federal cybersecurity and information technology news: Kapersky Labs has uncovered a massive cyber espionage campaign using malware called Flame to collect private data in countries including Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia, and Egypt. More here. Researchers in the UK found a backdoor planted in an American military-grade chip that allows attackers to […]