40.7 F
Washington D.C.
Tuesday, December 7, 2021
HomeFederal PagesGovernment Reports and Summaries

Government Reports and Summaries


OIG: DHS Needs to Improve its HSPD-12 Identification Program

The Homeland Security Program Directive 12 was introduced in 2004 to ensure that a secure and reliable form of identification was used to gain access to federally controlled facilities and information systems.

GAO: Army National Guard Needs to Monitor Internal Incentive Controls

The report follows $22 million of improper payments that the California Army National Guard (ARNG) made in cash bonuses and other incentives between 2004 and 2010.

GAO: NNSA Has Not Made Long-term Plans for Uranium Supply

NNSA has prepared cost estimates for the two uranium enrichment technology options that it considers to be most feasible, but GAO found these estimates are limited in scope and do not reflect best practices.

GAO: DoD Could Improve Practices for Developing Program Managers

Major defense acquisition programs have been plagued with cost and schedule overruns - initial expectations have been exceeded by $484 million and average overruns are 31 months - so acquisition program managers are essential to keep things on track.

GAO: Agencies Need Additional Assessment of NIST Cybersecurity Framework Adoption

DHS found four challenges to cybersecurity framework adoption, which include not being able to commit necessary resources, a lack of knowledge and skills, regulatory requirements and other priorities taking precedence.

TSA Could Improve How it Processes Sensitive Security Information, Finds OIG

The OIG found that although TSA has adequate policies in place for reviewing sensitive security information, some of its critical guidance on identifying such data needs to be updated.

U.S. Contributions to Inter-American Organizations Could be Reduced in Near Future

The State Department is working with OAS to reform its fee structure and ensure no member state pays more than 50 percent.

NIST Releases Cybersecurity Report on the Internet of Things

It found that standards were urgently needed for all five IoT components within network security and IT system security evaluation.
Stay Connected
Category Template - Magazine PRO Homeland Security Today
Latest Articles