security

See the following -

Ubuntu 13.04 Review: Linux For The Average Joe Or Jane

Steven J. Vaughan-Nichols | ZDNet | April 25, 2013

Hard core Linux fans won't care for it, but for the average user the new Ubuntu desktop Linux has a lot to offer. Read More »

UK Cabinet Office Relaunches Data.gov.uk, Releases Open Data White Paper

Alex Howard | O'Reilly Radar | June 29, 2012

The British government is doubling down on the notion that open data can be a catalyst for increased government transparency, civic utility and economic prosperity. Read More »

UK Government defines Open Standard's Principles

Glyn Moody | Computerworld | November 12, 2012

In a huge win for open standards, open source and the public, the long-awaited UK government definition of open standards has come down firmly on the side of RF, not FRAND. The UK government's approach is enshrined in an important new document defining what it calls Open Standards Principles. Read More »

UK's Security Branch Says Ubuntu Most Secure End-User OS

Steven J. Vaughan-Nichols | ZDNet | January 17, 2014

CESG, the UK government's arm that assesses operating systems and software security, has published its findings for ‘End User Device’ operating systems. The most secure of the lot? Ubuntu 12.04. Read More »

US Government Opens Access to Federal Source Code with Code.gov

Swapnil Bhartiya | Linux.com | November 11, 2016

In March of this year, the Obama administration created a draft for Federal Source Code policy to support improved access to custom software code. After soliciting comments from public,  the administration announced the Federal Source Code policy in August. One of the core features of the policy was the adoption of an open source development model: This policy also establishes a pilot program that requires agencies, when commissioning new custom software, to release at least 20 percent of new custom-developed code as Open Source Software (OSS) for three years, and collect additional data concerning new custom software to inform metrics to gauge the performance of this pilot...

Read More »

Ushahidi Wins MacArthur Award: Changing The World One Map At A Time

Beth Kanter | Beth's Blog | February 28, 2013

Recognizing remarkable creativity and effectiveness by non-profits across the globe, the John D. and Catherine T. MacArthur Foundation named 13 organizations as recipients of the MacArthur Award for Creative and Effective Institutions. Read More »

VA Awards Contract For Mobile Device Management, Apps Store

Jared Serbu | Federal News Radio | October 3, 2012

The Department of Veterans Affairs has awarded a long-awaited contract to build a system that will manage a stable of mobile devices officials hope will eventually grow to 100,000 handhelds and tablets. Read More »

VA BYOD Reimbursement Strategy Isn't IT's Call, Says Baker

Molly Bernhart Walker | FierceGovernmentIT | September 27, 2012

Who pays for data plans under a forthcoming bring-your-own-device strategy at the Veterans Affairs Department? Don't ask Chief Information Officer Roger Baker--determining that isn't his job, he says. Read More »

VA Data Exchange Practices Lack Security

Molly Bernhart Walker | FierceGovernmentIT | October 25, 2012

Veterans Affairs Department medical centers are not effectively or securely sharing data with research and university facilities, according to an Oct. 23 VA office of inspector general report (.pdf). Read More »

VA Harnesses Big Data For Broader Impact

Judi Hasson | AOL Government | August 23, 2012

Dr. Stephan Fihn is sitting on the edge of a revolution at the Department of Veterans Affairs, where big data is becoming easily accessible for clinicians and analysts throughout its 160 hospitals. Read More »

VA Networks Besieged By Foreign Attackers, IG Says

Nicole Blake Johnson | Federal Times | June 4, 2013

Foreign attackers have repeatedly penetrated Veterans Affairs Department networks for at least the past three years, potentially gaining access to millions of unencrypted veterans records and other sensitive databases, according to House lawmakers and VA inspector general auditors. Read More »

VA, DoD EHR Project: Security Game Plan

Marianne Kolbasuk McGee | GovInfoSecurity | March 1, 2013

Although the Department of Veterans Affairs and Department of Defense are taking a new approach to building their long-awaited integrated electronic health record system, many key components of the data security strategy for the project will remain the same, says Roger Baker, the VA's outgoing CIO. Read More »

Vampire Data And 3 Other Cyber Security Threats For 2013

Mike Miliard | Government Health IT | December 31, 2012

Kroll Advisory Solutions has released its 2013 Cyber Security Forecast, spotlighting some of the pressing and perhaps unexpected privacy and security issues healthcare and other organizations may be grappling with in the coming year. Read More »

VanRoekel: Agencies To Adopt NSTIC

Molly Bernhart Walker and David Perera | FierceGovernmentIT | October 15, 2012

The Office of Management and Budget wants agencies to adopt the National Strategy for Trusted Identities in Cyberspace, or NSTIC, to enable shared, citizen identity management across government. Read More »

VA’s Roger Baker Updates EHR Security Strategy

Patrick Ouellette | Health IT Security | March 4, 2013

Outgoing Assistant Secretary for Information and Technology and U.S. Department of Veterans Affairs (VA) CIO Roger W. Baker provided testimony last week on the VA and Department of Defense (DoD) joint EHR venture. In doing so, he highlighted how the organizations plan on maximizing data security with the new technologies. Read More »