DoD’s cloud policy rains some risks, IG says

From: 1500AM

By Scott Maucione | @smaucioneWFED

A new Defense Department Inspector General’s report found problems with the Pentagon’s cloud policy that may have monetary and cybersecurity risks.

DoD does not maintain a comprehensive list of cloud computing service contracts because the department’s chief information officer failed to establish a standard, department-wide definition for cloud computing. In addition, the DoD CIO did not develop an integrated repository that could provide detailed information used to identify cloud computing service contracts, the report stated.

Read Complete Article


In A Cyber Attack, Dead ATMs Would Be The Least Of It

From: Forbes

In Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel explores what would happen to the United States if an enemy attacked the electrical grid — what would life look like if we lost electricity for weeks or months? Security experts agree that the grid is vulnerable and several, including Richard A. Clarke who served in senior national security positions under presidents from Ronald Reagan to Bill Clinton, are sure the Russians and Chinese penetrated it years ago. The Wall Street Journal reported in April 2009 that the Chinese had placed logic bombs in the electrical grid.

OMB Sets New Guidelines for Federal Agencies’ Software Purchases, Management

From: FedTech

The federal government wants to restructure how agencies procure and handle their software licenses.


Last week, the Office of Management and Budget released draft guidelines on how federal agencies should purchase and manage software licenses. The guidelines are part of an effort to streamline and coordinate software purchases across the federal government.

The guidelines set several deadlines for federal agencies to meet in 2016 as they work to improve their software procurement procedures. As FedScoop reported, the guidelines are designed to foster a more centralized approach to how software is managed within so-called CFO Act agencies. They are also aimed at letting agencies get software contracts that can be used across the entire federal government, which could potentially save money.

Protecting Against Cyberattacks a Constant Battle

From: Government Technology

Unlike most other areas of criminal investigation, in cyber crime the private security sector is seen as a huge partner to law enforcement, with its expertise and eagerness to close any vulnerabilities.

by Kristina Davis, The San Diego Union-Tribune

(TNS) — About a dozen military bases. More than 500 defense contractors. One of the largest concentrations of biotech in the world. All in one county.


“If you take down all the power grids in San Diego, you take away a portion of the Navy’s ability in the United States,” said Eric Basu, president and CEO of San Diego-based Sentek Global, a technology service provider for the government.

What NCUA’s Inspector General Intends To Audit

From: CU Today

ALEXANDRIA, Va. – NCUA’s Office of the Inspector General (OIG) has released its list of audits that it said would most benefit the agency in 2016. The information was included in the OIG’s 2016 performance plan.


The OIG said discretionary audits it is considering for 2016 include:

  • ***
  • Determining whether the NCUA adequately limits or controls employee and contractors access to sensitive NCUA and credit union data stored within the NCUA’s IT infrastructure.

Read Complete Article