News in Brief

Another CIO retirement, Lerner's email and an unpatched software alert

Shutterstock image (by Pavel Ignatov): digital email icon.

Intelligence CIO retires

Al Tarasiuk retired as CIO of the intelligence community on April 28 after more than four years at the helm.

In a statement, Director of National Intelligence James Clapper credited Tarasiuk with advancing the IC Information Technology Enterprise, an ongoing quest for a single, standards-based IT architecture across intelligence agencies.

Tarasiuk helped the intelligence agency CIOs "through this important transformational effort," Clapper's statement said. Tarasiuk's work has "drawn the IC closer together to work better, faster and smarter. This is exactly what Congress intended when it empowered the IC CIO with community-wide authority over enterprise architecture."

Tarasiuk joined the Central Intelligence Agency in 1988 and served as its CIO from 2005 to 2010 before assuming that role for the broader intelligence community.

IG uncovers thousands of missing Lerner emails

The Treasury Department's inspector general for tax administration said roughly 6,400 emails to or from Lois Lerner, the former director of the IRS's Exempt Organizations Division, have been found and turned over to congressional investigators, The Hill newspaper reported.

The emails were sent between 2004 and 2013. The IRS claimed last year that Lerner's computer crashed in 2011, resulting in the loss of an unknown number of emails.

The IG said about 650 of the rediscovered emails were from 2010 and 2011, and most were from 2012, according to The Hill. About 35,000 emails were recovered in all from recycled back-up tapes.

Lerner has been accused of improperly focusing reviews of tax-exempt status on political opponents of the Obama administration.

CERT cites unpatched software risks

The Department of Homeland Security's Computer Emergency Readiness Team issued a list of the top 30 targeted high-risk vulnerabilities from unpatched software on April 29.

A notice from CERT said the top 30 vulnerabilities could affect systems running unpatched software from Adobe, Microsoft, Oracle or OpenSSL. Internet Explorer, Office Word, Excel and Acrobat are all on the list.

The alert noted that cyber threat organizations continue to use unpatched software to attack critical infrastructure providers, but 85 percent of those attacks could be prevented if root vulnerabilities are corrected.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.