Search results for: Cyber
Displaying 1 - 20 of 2729 items
Cybersecurity: Implementation of Executive Order Requirements is Essential to Address Key Actions
… Cybersecurity: Implementation of Executive Order Requirements is Essential to Address Key Actions Marisol Cruz Cain cruzcainm@gao.go (202) … to fully implement the order's requirements. DHS agreed with recommendations to further define critical software and improve operations of the Cyber Safety Review Board. OMB stated it had no comments on GAO's report. Chief information security officers Compliance oversight Critical infrastructure protection Critical infrastructure vulnerabilities Cybersecurity Cyberspace threats Federal acquisitions Federal agencies Homeland security Information security Information systems National …
CueBid Technologies, Inc.
… in good faith, and a protester’s contention that contracting officials were motivated by bias or bad faith must be supported by convincing proof. Cyberdata Techs., Inc. , B-417084, Feb. 6, 2019, 2019 CPD ¶ 34 at 6. The burden of establishing bad faith is a heavy one. Evidence establishing a … protester’s general assertions and unsubstantiated suspicions do not amount to an allegation of bad faith meriting review by our Office. Id. ; Cyberdata Techs., Inc., supra (“[T]o the extent that [protester] is alleging bad faith on the part of the agency, we conclude that [protester] … in good faith, and a protester’s contention that contracting officials were motivated by bias or bad faith must be supported by convincing proof. Cyberdata Techs., Inc., B-417084, Feb. 6, 2019, 2019 CPD ¶ 34 at 6. The burden of establishing bad faith is a heavy one. Evidence establishing a …
VivSoft Technologies, LLC
… vendor’s ability to establish secure solutions.” Id. The TEP noted that “[t]his degrades the security posture, making the system vulnerable to cybersecurity attacks and data breaches.” Id. The protester disagrees with the agency’s evaluation and contends that its quotation described in … in the vendor’s ability to establish secure solutions,” which the TEP found “degrades the security posture, making the system vulnerable to cybersecurity attacks and data breaches.” AR, Tab 20A, Consensus Eval. (Factor 3) at 6. While, as noted above, the protester disagrees with the … vendor’s ability to establish secure solutions.” Id. The TEP noted that “[t]his degrades the security posture, making the system vulnerable to cybersecurity attacks and data breaches.” Id. The protester disagrees with the agency’s evaluation and contends that its quotation described in …
BAO Systems, LLC
… party to raise these challenges because it would not be in line for contract award were its protest to be sustained. See 4 C.F.R. § 21.0(a)(1); Cyberdata Techs., Inc. , B-411070 et al. , May 1, 2015, 2015 CPD ¶ 150 at 9. This protest is denied in part and dismissed in part. Edda Emmanuelli … party to raise these challenges because it would not be in line for contract award were its protest to be sustained. See 4 C.F.R. § 21.0(a)(1); Cyberdata Techs., Inc., B-411070 et al., May 1, 2015, 2015 CPD ¶ 150 at 9. This protest is denied in part and dismissed in part. Edda Emmanuelli … party to raise these challenges because it would not be in line for contract award were its protest to be sustained. See 4 C.F.R. § 21.0(a)(1); Cyberdata Techs., Inc. , B-411070 et al. , May 1, 2015, 2015 CPD ¶ 150 at 9. This protest is denied in part and dismissed in part. Edda Emmanuelli …
Electronic Health Records: DOD Has Deployed New System but Challenges Remain
… with this new system. We recommended , among other things, that it do so. Report Government Accountability Office: Information Technology and Cybersecurity Matter for Congressional Consideration See All 3929 Recommendations Recommendations for Executive Action See All 59172 … We recommended , among other things, that it do so. … 106187 … GAO-24-106187 … Government Accountability Office: Information Technology and Cybersecurity … harriscc@gao.gov … Report …
Fiscal Year 2025 Budget Request: U.S. Government Accountability Office
… Government Accountability Office A. Nikki Clowers Managing Director clowersa@gao.gov (202) 512-4400 Budget appropriations Budget requests Budgets Cybersecurity Federal agencies Federal funds Fraud, waste, and abuse GAO's fiscal year National security Legislation GAO Mission and Operations … work includes many aspects of artificial intelligence, medical research and applications, critical minerals recovery, and quantum computing. Cybersecurity. GAO assesses the development and execution of a comprehensive national cybersecurity strategy, the cybersecurity of 16 critical infrastructure sectors across the U.S., and the security of federal information systems. …
Homeland Security: DHS Internal Entities Facilitate Information Sharing in Key Areas and Collaborate as Needed
… responsible for responding to new and emerging threats against the nation. To help accomplish this broad mission—encompassing counterterrorism, cyber protection, border security, and disaster response, among others— departmental offices and components must effectively share information. … It is composed of I&A and the intelligence components of the following DHS entities: the Countering Weapons of Mass Destruction Office, the Cybersecurity and Infrastructure Security Agency, the Federal Emergency Management Agency, the Federal Protective Service (within the Management …
MindPoint Group, LLC
… of Herndon, Virginia, by the Federal Retirement Thrift Investment Board (FRTIB) under request for quotations (RFQ) No. FRTIB1-23-Q-0018, for cybersecurity, risk, and compliance support services. The protester challenges the evaluation of quotations and source selection decision. Bid … [1] of Herndon, Virginia, by the Federal Retirement Thrift Investment Board (FRTIB) under request for quotations (RFQ) No. FRTIB1‑23‑Q‑0018, for cybersecurity, risk, and compliance support services. The protester challenges the evaluation of quotations and source selection decision. We deny … holders of General Services Administration (GSA) multiple award schedule (MAS) contracts with special item number (SIN) 54151 for highly adaptive cybersecurity services (HACS). Agency Report (AR), Tab 2, Initial RFQ at 1, 13. The RFQ contemplated the issuance of a task order with a 12-month …
The U.S. Now Has a National Cybersecurity Strategy, but Is It as Strong as It Could Be?
… The U.S. Now Has a National Cybersecurity Strategy, but Is It as Strong as It Could Be? In February, Change Healthcare, the largest health care payment processer in the … nation’s critical services, such as health care, water, electric, and our financial institutions. Last year, the White House issued a National Cybersecurity Strategy that outlines steps the government is taking to address the longstanding cybersecurity challenges facing the country. We looked at the national strategy’s plans and found some key weaknesses that could diminish its …
Vehicle Repair: Information on Evolving Vehicle Technologies and Consumer Choice [Reissued with revisions on Apr. 5, 2024]
… [Reissued with revisions on Apr. 5, 2024] Elizabeth (Biza) Repko Director repkoe@gao.gov (202) 512-2834 Automobiles Consumer complaints Consumers Cybersecurity Electric vehicles Motor vehicle standards Transportation Vehicle safety Commerce Electronics Business Regulation and Consumer … National Highway Traffic Safety Administration (NHTSA) is focused on vehicle safety and its role in vehicle right-to-repair issues is limited to cybersecurity issues that could affect vehicle safety. The Federal Trade Commission (FTC) is involved in protecting consumers and promoting … automakers for some repairs in the future, dealerships also would likely miss out on the opportunity to conduct such repairs. There are potential cybersecurity risks with sharing access to vehicle data, including telematics data, as we have previously reported.19 Cybersecurity risks can …
Coast Guard: Aircraft Fleet and Aviation Workforce Assessments Needed
… for a revised baseline. 2According to the Coast Guard, these systems include sensors, radar and command, control, communications, computers, cyber, intelligence, surveillance and reconnaissance equipment. Appendix III: Status of Coast Guard’s Four Acquisition Programs for Aviation Page … the new mission systems. According to the Coast Guard, these systems include sensors, radar and command, control, communications, computers, cyber, intelligence, surveillance, and reconnaissance equipment. Appendix III: Status of Coast Guard’s Four Acquisition Programs for Aviation Page …
Cybersecurity: Improvements Needed in Addressing Risks to Operational Technology
… Cybersecurity: Improvements Needed in Addressing Risks to Operational Technology Marisol Cruz Cain Director cruzcainm@gao.gov (202) 512-5017 GAO … practices Control systems Critical infrastructure Critical infrastructure protection Critical infrastructure vulnerabilities Customer service Cybersecurity Cyberspace threats Federal agencies Homeland security Human capital management National security Public and private partnerships Risk management …
Ukraine: Status of Foreign Assistance
… organizational reforms in this area. Support has targeted specialized units, including those focusing on trafficking in persons, migration, cybercrime, and war crimes, according to State documents. • Conflict Mitigation and Stabilization assistance supports activities such as … European partners’ capacity to detect and investigate complex crimes related to organized crime, such as money laundering, narcotics trafficking, cyber and cyber-enabled crimes, and corruption. According to State documents, organized crime and corruption enable Russian and other foreign malign actors …
Military Readiness: Comprehensive Approach Needed to Address Service Member Fatigue and Manage Related Efforts
… Command, U.S. Army Combat Capabilities Development Command, Defense Centers for Public Health-Aberdeen, U.S. Army Forces Command, U.S. Army Cyber Command, U.S. Army Intelligence and Security Command • Air Force: Headquarters, 711th Human Performance Wing, Signature Tracking for …
Higher Education: Hispanic-Serving Institutions Reported Extensive Facility and Digital Infrastructure Needs
… Institutions Reported Extensive Facility and Digital Infrastructure Needs Melissa Emrey-Arras Director emreyarrasm@gao.gov (617) 788-0534 Cybersecurity Deferred maintenance Education or training costs Endowments Grant programs Higher education Hispanic Americans Internet Internet … the need to repair or replace some facilities. HSIs also reported unmet digital infrastructure needs related to internet access and connectivity, cybersecurity, and hybrid learning efforts, according to GAO's survey. For example, GAO estimates that at roughly a third of HSIs, more than 10 … because they cannot afford an internet connection or they lack an appropriate device. Most HSIs (an estimated 74 percent) have also experienced a cyberattack within the previous 5 years. HSIs made recent investments in hybrid learning as a result of the COVID-19 pandemic and related federal …
Cybersecurity: National Cyber Director Needs to Take Additional Actions to Implement an Effective Strategy
… Cybersecurity: National Cyber Director Needs to Take Additional Actions to Implement an Effective Strategy Marisol Cruz Cain Director cruzcainm@gao.gov (202) 512-5017 GAO … a cost estimate and develop such cost estimates. Agency evaluations Cost estimates Critical infrastructure Critical infrastructure protection Cybersecurity Cyberspace High-risk issues Homeland security Information systems Information technology National security Performance measurement Risk management …
Civilian Harm: DOD Should Take Actions to Enhance Its Plan for Mitigation and Response Efforts
… go through 2025. Second, some DOD component officials are unclear on how the action plan is relevant to nonkinetic activities, such as space and cyber operations. A Policy official stated that figuring out the specifics of how to mitigate and respond to civilian harm in nonkinetic … the plan. But DOD hasn't addressed 2 key challenges—DOD components don't know what constitutes improvement under the plan or how it applies to cyber and other operations that may cause harm without the use of force. We recommended setting performance goals and clarifying how the plan … go through 2025. Second, some DOD component officials are unclear on how the action plan is relevant to nonkinetic activities, such as space and cyber operations. A Policy official stated that figuring out the specifics of how to mitigate and respond to civilian harm in nonkinetic …
Artificial Intelligence: Fully Implementing Key Practices Could Help DHS Ensure Responsible Use for Cybersecurity
… Artificial Intelligence: Fully Implementing Key Practices Could Help DHS Ensure Responsible Use for Cybersecurity Candice N. Wright Director wrightc@gao.gov (202) 512-6888 Kevin Walsh Director walshk@gao.gov (202) 512-6151 GAO is making eight … eight recommendations. Artificial intelligence Best practices Chief information officers Compliance oversight Critical infrastructure protection Cybersecurity Cyberspace threats Federal agencies Homeland security Inventory Personally identifiable information Privacy Information Security GAO-24-106246 …
Information Technology: IRS Needs to Complete Planning and Improve Reporting for Its Modernization Programs
… modernization programs. We recommended , among other things, that it do so. Report Government Accountability Office: Information Technology and Cybersecurity Matter for Congressional Consideration See All 3929 Recommendations Recommendations for Executive Action See All 59172 … The TSS investment began in 2001. IRS has reported that modernization is needed to improve its core tax administration systems, operations, and cybersecurity. The agency has also reported that modernization is critical to improving customer experience and providing the kind of service … business tax account, using artificial intelligence and improved technology to identify sophisticated schemes to avoid taxes, and strengthening cybersecurity. · Along with appropriating funds through the IRA, Congress eliminated the BSM appropriation for fiscal year 2023. With these funds, …
Port Infrastructure: U.S. Ports Have Adopted Some Automation Technologies and Report Varied Effects
… and trucks can lower the risk of illicit activities. · Increased number of systems connected to the internet can heighten vulnerability to cyber threats. Emissions · Increased efficiency of container movements can reduce emissions. · Increased visibility of container availability and … locations. A few port stakeholders noted that having more equipment and systems connected to the internet can increase vulnerability to cyber-attacks; however, a few of the port stakeholders Letter Page 21 GAO-24-106498 Port Technology said that automation technologies may not be any more susceptible to cyber-attacks than their existing internet-connected systems. Emissions Some of the port stakeholders we interviewed said that automation …