Tag Archives: Department of Homeland Security

Federal Information Security: There’s Work to Do

Just about every federal government operation—from processing taxes and protecting national parks to coordinating military operations and delivering foreign aid—relies in some way on computers. Protecting government computer systems and the information stored in them is vital, and a 2014 … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Protecting our Critical Infrastructure

We depend on the nation’s critical infrastructure—such as the systems that provide energy, transportation, communications, and financial services—to provide us with our basic needs. In today’s WatchBlog, we explore federal efforts to protect some of our critical infrastructure from things … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , ,

Federal Government Contracting for Fiscal Year 2018 (infographic)

With tax season over, now is a good time to look at how the government uses your tax dollars. About 40% of the government’s discretionary spending goes to contracts for goods and services covering everything from health care to hand … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

GAO’s Guide to Saving the Government Billions of Dollars: Reducing Fragmentation, Overlap, and Duplication in Federal Programs

Today we released our 9th annual report on fragmentation, overlap, and duplication in the federal government, adding 98 new actions that Congress or federal agencies can take to improve government programs. For example: The Department of Energy could avoid spending … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Marking 40 Years of FEMA

In 1979, President Jimmy Carter signed an executive order merging many separate, disaster-related responsibilities into an independent agency called the Federal Emergency Management Agency. In the 40 years since its creation, FEMA has undergone dramatic changes—most notably in 2003, when … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , ,

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

Emerging Threats to the United States

The United States faces many threats to our political, economic, military, and social systems that could hurt national security. Federal agencies, including the Departments of Defense, State, and Homeland Security, as well as the Office of the Director of National … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,

DHS Cybersecurity Workforce

Secure federal computer systems depend on the federal and contractor workforce who design, develop, implement, secure, maintain, and use them. But the federal government faces a persistent shortage of workers trained in cybersecurity and information technology. The Department of Homeland … Continue reading

Image | Posted on by | Tagged , , , , ,

A “Quick Look” at DOD, NASA, and DHS Acquisitions

For the past 15 years, we’ve been reviewing the federal government’s largest acquisition programs in our “Quick Looks”—and our latest reports featured the Department of Defense, NASA, and the Department of Homeland Security. While each agency serves a different mission, … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , ,