“Technology alone can't reduce privacy risks,” says computer science professor Susan Graham, one of the authors of a White House report on big data. “There has to be policy as well.”
The Telecommunications Industry Association also told GSA that federal workforce training is crucial to bolstering cybersecurity in the acquisition process.
The nonbinding rules are aimed at reducing vulnerabilities in the power sector's procurement process.
Key backers say they will hold OMB's "feet to the fire" to ensure the agency lives up to the measure's requirements.
The department's inspector general used automated software to direct suspicious traffic at the public-facing websites of five offices; only one analyzed and moved to block the threat.
The House passed the spending transparency legislation easily, as the Senate did earlier, but it's not clear what the White House position is.
Cybersecurity firm Qualys estimated that more than 10 percent of computers used in government and corporations worldwide still use the OS, which Microsoft stopped supporting three weeks ago.
“We need to pay careful attention to what unexpected outcomes the use of big data might lead to, and how to remedy any unintended discrimination or inequality that may result," according to presidential advisor John Podesta, who is heading up a White House policy review.
A common thread of the various projects is that they look at social or business problems addressed by large-scale institutions and look to disrupt them through crowdsourcing and data.
The national lab is applying cognitive psychology and neuroscience to the field of airport security.
Medical innovators show how better records and advanced algorithms can transform treatment.
Under a cross-licensing agreement, American Technical Services will commercialize the system, while the Navy obtains a license to use ATS software.