Tag Archives: cybersecurity

Recent Cyberattacks Further Highlight Need For Action

Recent high-profile and widespread cyberattacks on federal agencies and national infrastructure have further highlighted the need for the government to address this attack and prevent future ones. However, these threats and the challenges in addressing them are long-standing and have … Continue reading

Posted in About GAO, Collections, High Risk List | Tagged , , , , , , , , , , , | Leave a comment

What is 5G and Why Does It Matter?

Billed as the next generation of wireless technology, 5G has the potential to transform industries and society now and in the years to come. But what is 5G and what does it make possible? Today’s WatchBlog explores the latest in … Continue reading

Posted in About GAO, Information Technology | Tagged , , , , , , , , , , , , | Leave a comment

Protecting Critical Infrastructure from Cyberattacks

The nation’s critical infrastructures —such as energy, transportation systems, communications, and financial services—are dependent on information technology (IT) systems and electronic data to carry out and report on operations. But these systems are increasingly at risk from things like insider … Continue reading

Posted in About GAO | Tagged , , , , , , , , | Leave a comment

Federal Information Security: There’s Work to Do

Just about every federal government operation—from processing taxes and protecting national parks to coordinating military operations and delivering foreign aid—relies in some way on computers. Protecting government computer systems and the information stored in them is vital, and a 2014 … Continue reading

Posted in Government Operations, Information Security | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Protecting our Critical Infrastructure

We depend on the nation’s critical infrastructure—such as the systems that provide energy, transportation, communications, and financial services—to provide us with our basic needs. In today’s WatchBlog, we explore federal efforts to protect some of our critical infrastructure from things … Continue reading

Posted in Energy, Homeland Security | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment

Preparing for Evolving Cybersecurity Threats Facing the U.S. Electric Grid

Electricity is essential for modern life. In addition to our modern home conveniences, like our microwaves, computers, and lighting, electricity is vital to hospitals, first responders, and financial services in our country. So, what would happen if our electric grid … Continue reading

Posted in Information Security, Science and Technology | Tagged , , , , , , , , , , , , , , | Leave a comment

Proving You’re You: How Federal Agencies Can Improve Online Verification

So much of how we collect and share information in today’s world is done online. We get our news. We do our shopping and banking. We book appointments. And online access has even made it easier for us to apply … Continue reading

Posted in Information Security | Tagged , , , , , , , , , , , , | Leave a comment

Artificial Intelligence: Still a Long Way from Judgment Day

The 1991 sci-fi film Terminator 2 predicted that artificial intelligence (AI) software known as Skynet would become self-aware on August 29, 1997, and rapidly take over the world. Today, even as we celebrate avoiding such an extreme outcome for 22 … Continue reading

Posted in Science and Technology | Tagged , , , , , , , , | Leave a comment

A Look at the Federal Government’s Aging Computer Systems

Imagine trying to read this post on a first- or second-generation mobile phone. It would be slow to load and the screen image wouldn’t be as crisp as the one you’re probably looking at right now. There’d be a lot … Continue reading

Posted in Information Security, Information Technology, Podcast | Tagged , , , , , | Leave a comment

Are Tax Practitioners Protecting Your Personal Information?

Doing your taxes can be complicated. So it’s no surprise that nearly 90% of taxpayers use either a paid preparer or tax software to prepare and file their taxes each year. In an age of data breaches and identity theft, … Continue reading

Posted in Information Security, Tax Policy and Administration | Tagged , , , , , , , , , , , , , , | Leave a comment