IG: VA faces challenges in moving to paperless claims processing, Trojan Steals Legit Digital Certificates and more

VAHere are the top cyber news and stories of the day.

  • IG: VA faces challenges in moving to paperless claims processing – “Problems with the Veterans Benefits Management System are hindering Veterans Affairs Department efforts to eliminate its backlog of disability claims and to increase the accuracy rate of claims processing to 98 percent by 2015, says a Feb. 4 VA inspector audit report (.pdf).” The IG found that the VBMS is still in early, untested stages and not yet ready for primetime. Via FierceGovernmentIT, more here.
  • DOD holds IT Job Shadow Day - The DoD held their seventh annual IT Job Shadow day on Thursday, welcoming more than 40 students into DoD. “”The most critical resource we have is the workforce,” said David DeVries, DOD deputy chief information officer.” Recruiting talent is one of the hardest parts of government IT, and events such as this help make it happen. Via FedScoop, more here.
  • 6 mobile security screw-ups you’re (probably) guilty of – Raj Sabhiok of Zoho Corp. outlined 6 mobile security slip-ups that many make. Here they are: “use a password, antivirus for all devices, try two-factor authentication, remotely disable devices, accept those mobile updates…fast and Jailbroken = less secure.” These are all good pieces of advice to increase your mobile security paradigm, though I’d offer one final piece of advice, only download apps that you know, and from repositories you trust. Via Forbes, more here.
  • NTIA announces FirstNet state planning grant requirements – “The National Telecommunications and Information Administration announced Feb. 6 state allocations of $121.5 million in federal grant money to be used for planning the nationwide public safety broadband network.” This network is designed to provide structure for the first responder network. Via FierceGovernmentIT, more here.
  • Trojan Steals Legit Digital Certificates – A current Trojan out there can infiltrate banking networks via “spoofing legitimate digital certificates.” This type of attack further undermines the capabilities of banks to defend themselves. Via ISS Source, more here.
  • Clean Energy Tied to National Security, Official Says – “Sharon E. Burke, the assistant secretary of defense for Operational Energy Plans and Programs, told industry partners and congressional leaders at the American Council on Renewable Energy’s National Renewable Energy Policy Forum that the motivation for seeking out clean energy sources is strongly rooted in national security interests.” Moving to energy that is not reliant on foreign nations will definitely improve the ability of our nation to operate independently and improve our security paradigm. Via Equities.com, more here.
  • NIST releases final draft of cybersecurity document for public comment – after two years of work, NIST has released the fourth version of their cybersecurity document for public comment. This document details “the security safeguards and countermeasures that federal agencies will use to protect their data and information system.” It will greatly inform decisions made by federal civilian agencies in the future. Via FierceGovernmentIT, more here.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.

 

Recent Research

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks

Innovators, Integrators and Tech Vendors: Here is what the government hopes they will buy from you in 2015

solid
About Ryan Kamauff

Ryan Kamauff is a senior analyst with Crucial Point LLC. He produces technology focused content for CTOvision.com and reports on analytical megatrends at the new analysis focused Analyst One.