“I’m appreciative of the partnership of industry to come in and help us achieve our missions.”
If the solution is adaptable it will continue being desirable, even when the agency is dealing with the next threat in the mail.
While the federal government sets aside certain procurements for small businesses, those companies — if they’re successful — eventually grow to the size where they “graduate” out of the small-business category.
Coast Guard cybersecurity specialists recently boarded a vessel before admitting it to port, to ensure the cyberattack it had suffered hadn’t impacted its control systems and wouldn’t spread to other vessels, said Vice Admiral Daniel Abel, deputy commandant for operations of the U.S. Coast Guard.
FBI failures meant that known or suspected terrorists, including an unknown number on the No Fly list, were issued a TWIC card — a special federal identity document allowing them unescorted access to secure areas of port facilities, according to a recent audit by the Office of Inspector General.
Morrison’s backers are drawing parallels with the promotion of Gen. David Petraeus to U.S Centcom commander — in charge of the war in Iraq — after he authored the Army’s counter-insurgency manual.
In a shock move announced on Twitter, President Trump Friday reversed his administration’s decision to designate two shipping companies based in China for helping North Korea evade international sanctions — apparently blindsiding Treasury officials.
“I look at this in the context of the government shutdown,” said retired Senior Chief Jon Ostrowski, CPOA national president, recalling that service members were either furloughed or working — but in either case without pay. “It was a needed bit of morale-boosting.”
“When asked about our Service, we tend to talk about our missions and operations, or our platforms,” the commandant said. “But if you want to truly understand the Coast Guard, look to the men and women of our Service – they define our strength, our character, and are the foundation of our military readiness.”
The GSA says “Goodbye!” to the Data Universal Numbering System, or DUNS numbers — and the vendor who provided them, Dun and Bradstreet. It says “Hello!” to the System for Award Management Managed Identifier or SAMMI number — and its new vendor, Ernst and Young.
Norwegian hydro-power and aluminum giant Norsk Hydro has been winning plaudits for the way it responded to a massive ransomware attack that shut down the company’s IT network Tuesday and forced it to resort to manual operations at many of its plants.
The U.S. military has already been overtaken in its warfighting ability by “near peer” adversaries Russia and China — if you take into account the vulnerability to cyber attack of America’s civilian industries vital to the war effort, like the power grid.
Two major groups representing advertisers in New Zealand are urging companies to reconsider spending on Facebook and other social media sites, after the massacre of 50 people at two mosques in Christchurch was video-streamed live — and remained available online five days after the massacre.
DHS will host the first-ever National Summit on Terrorism Prevention this year, aiming to “crowd-source” the department’s mission to defend the homeland. The summit, bringing together “tech companies, NGOs, community leaders, law enforcement, social service providers,” and others, is part of a new “whole of society” approach to needed in the face of new threats evolving too quickly for a government-speed response.
U.S. Immigration and Customs Enforcement is experimenting with some new and innovative techniques in procurement — an effort to make the process quicker and easier to understand for vendors, especially smaller businesses.
The Defense Advanced Research Projects Agency, or DARPA, has published a list of 10 innovation target areas it hopes to use small business contracts to address in the coming year, and announced the establishment of a small business incubator.
A Senate procedure known as a “sequential referral” means that Vitiello’s nomination to be ICE director now gets considered by the Judiciary Committee, who have up to two months to act, making a floor vote before May 10 highly unlikely.
There is broad, bipartisan consensus about the need to secure the nation’s vital networks against hackers, cyber-spies and online criminals, which has gotten prior years’ cybersecurity requests funded in full. Moreover, the lion’s share of the money — $9.6 billion — is in the defense budget, which likewise enjoys support on both sides of the aisle.
ICE spent more than $54 million on IT and telecommunications systems development last year and a total of nearly $244 million on professional support services.
No details of the scenarios to be rehearsed were available, but past exercises have simulated responses to active-shooter and poison gas attacks.