Policy


DHS logo

Cyber a priority in DHS spending blueprint

The Einstein automated intrusion-detection system would be funded at $549 million under the president's proposal.

Image of the Pentagon

Defense budget zeroes in on cyber spending

Few specifics were revealed, but the trend is clearly toward tech and away from troops.

power lines at sunset

Report: Government should backstop efforts to protect grid

A study from the Bipartisan Policy Center recommends incentives to persuade utility companies to comply with industry standards.

NSA protest in front of Capitol

States aiming at NSA might hit contractors

Proposals under consideration in several legislatures would limit state interaction with firms assisting warrantless data collection.

monitor faces

Feds' facial recognition systems fall outside code of conduct

The National Telecommunications and Information Administration's code of conduct will apply only to commercial uses, at least to start.

Rep. Sam Graves, R-Mo.

Two bills look to give small business an edge in contracting

Small Business Committee Chairman Sam Graves hopes that putting teeth in data reporting requirements will give smaller firms a better chance to compete for federal contracts.

Defense Department CIO Teri Takai speaking at a Feb. 20, 2014, press conference.

Takai takes FITARA to task for oversight provisions

Defense Department CIO is concerned the legislation might collide with internal Pentagon realignment efforts.

illustration dollar sign in vise

DOD must mesh realignment with approaching budget battle

Current plans to trim Pentagon spending are clipping around the edges, and officials fear tougher choices will be hard for Congress to agree to.

computers and globe_data sharing

White House issues policy guide for administrative data sharing

Detailed guidance spells out what agencies can do to overcome institutional barriers to using data through collaboration across programs and agencies.

digital key

Draft language signals more transparent NIST

The National Institute of Standards and Technology has been on the defensive since it was revealed that the NSA subverted encryption standards.

Big Data

Report: Big data, cybersecurity intrinsically linked

Analysts see 'tremendous value' in data the government collects, but say infrastructure and policy prevent making the best use of it.

abstract image of money

Acquisition in the crosshairs amid DOD restructuring

Frank Kendall, the Pentagon undersecretary in charge of acquisition, outlined some tentative plans to streamline acquisition rules, ideally before the fiscal 2015 defense funding bill.