DOD

The Defense Department’s release of a new mobile device strategy late last week provides a revealing snapshot of how much work lies ahead for Defense officials in rationalizing the rapid adoption of smartphones, tablets, and mobile devices across the Department. It also highlights the urgent challenge to secure the use of those devices on Defense networks – even if it fell short of describing how and when DoD planned to tackle ongoing security concerns.

While the new strategy is seen as “a huge step forward,” as Jeff Sorenson, former U.S. Army/G-6 CIO and now partner at AT Kearney, sees it, it also also reflects the continuing gap that exists between DoD’s ability to integrate commercial mobile technology compared to other, faster-moving organizations. Keep reading →


The benefits of cloud computing are too compelling and numerous for agencies not to take serious adoption steps in this budget-constrained fiscal environment. Some estimate the government can save as much as $14.4 billion through cloud adoption.

Looking ahead, cloud will provide a platform for integrating mobility and BYOD into agencies’ day-to-day operations. The benefits of an increasingly commoditized IT world will be passed along quickly to taxpayers in the form of better and more cost-effective government services delivery. Sooner than expected, the government will be in the “Everything as a Service Era” with the vast majority of IT services being provided virtually via the cloud. Keep reading →


Interest in preventing waste, fraud, and abuse runs high in the federal government these days. Yet fraudulent contractors and healthcare providers continue to get paid so financial functions within agencies are always looking for a better mousetrap. For instance, The Association of Government Accountants released a study this May of best practices for scanning large data sets using the latest data analytics technologies for identifying potential improper payments.

Health and Human Services and the Defense Department account for most of the federal government’s annual improper payment tab. The 2011 figure was down a little, to $115 billion, thanks to some concerted agency work and prodding by the Office of Management and Budget. Keep reading →


Federal CIOs say agencies and government contractors must become completely familiar with FedRAMP security controls and how they relate to each agency prior to the cloud computing service program’s launch this summer.

Richard Spires, CIO of the Department of Homeland Security, was one of several CIOs who spoke about FedRAMP at a trade group breakfast Friday. He told the packed breakfast meeting that contractors and agencies alike have to remember that FedRAMP is “not just an optional thing we can elect to do,” it’s mandatory. Keep reading →


White House Cybersecurity Coordinator Howard Schmidt has announced three priority areas where federal departments and agencies “need to focus their cybersecurity activity” –and a new set of cyber security goals to be reached by 2014.

Schmidt, in a White House blog posted Friday, said his office has recognized “the challenge of knowing which (types of technology and talent) will be most effective when dealing with advanced adversaries, especially in a limited budget environment.” Keep reading →


Gen. Keith B. Alexander, Commander, U.S. Cyber Command and Director, National Security Agency/Chief Central Security Service shares insights on leading for success in the mobile frontier and amid the rapid evolution of technologies and threats:

__________________________________________________ Keep reading →


A GAO report to Congress has identified several areas where the government duplicates efforts, creating unnecessary costs and inefficiencies, but also reflects an improvement over last year.

The 2012 Duplicative Program Report, recently released by the Government Accountability Office, identified 51 areas “where programs may be able to achieve greater efficiencies or become more effective in providing government services.” Keep reading →

Not only has cybersecurity started to take shape legislatively, cloud computing security has started to take shape administratively in a meaningful way.

You won’t find huge surprises in the grandly named Concept of Operations (CONOPS) for the Federal Risk and Authorization Management Program, or FedRAMP. The 47-page document does fill out the plan, long promised by The Office of Management and Budget and the General Services Administration. What might be surprising is how elaborate the procedures and project plan turn out to be. Keep reading →


Improving situational awareness, creating trained cyber teams and building a more defensible architecture are top priorities for NSA and US Cyber Command (USCYBERCOM), according to Col. John Surdu, Military Deputy Chief, Combined Action Group (CAG).

Appearing on today’s Federal Executive Forum on Cybersecurity/Progress & Best Practices – “Defense & Homeland,” Col. Surdu outlined the top 5 priorities that both NSA and USCYBERCOM are pursuing to further advance the nation’s cyber defenses. Keep reading →

The Defense Information Systems Agency has opened a program office to manage Defense Department mobile devices and the applications that run on them, according to David Bennett, DISA’s acting component acquisition executive.

The new agency will also run an online store providing DOD users with applications and mobile device management (MDM) services, Bennett said, according to a Jan. 27 report by Government Computer News. Bennett commented on the initiative at an IDGA Network Enabled Operations conference in Alexandria, Va., Jan. 24. Keep reading →

Page 2 of 41234