Tag Archives: Greg Wilshusen

Federal Information Security: There’s Work to Do

Just about every federal government operation—from processing taxes and protecting national parks to coordinating military operations and delivering foreign aid—relies in some way on computers. Protecting government computer systems and the information stored in them is vital, and a 2014 … Continue reading

Posted in Government Operations, Information Security | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Posted in Information Security, Podcast | Tagged , , , , , , , , , , , | Leave a comment

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Posted in Information Security, Information Technology | Tagged , , , , , , , , , | Leave a comment

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Posted in About GAO, Information Security, Information Technology, Mission Team | Tagged , , , , , , , , , , , , , , , | Leave a comment

IRS in Need of Better Controls to Safeguard Taxpayer Data

Every tax season, you send information to the IRS about your salary, marriage status, and other personal and financial information. We’ve looked at whether IRS has effective controls in place to protect the sensitive financial and taxpayer data in its … Continue reading

Posted in Information Security, Tax Policy and Administration | Tagged , , , , , , , , , , , , , | Leave a comment

December Podcast Roundup – Podcasts You May Have Missed

We were busy podcasting all last year! And if you’re not subscribed on iTunes or our RSS feed, you’re missing out. Today’s WatchBlog catches you up on podcasts you may have missed last month. Protecting the Electric Grid: Severe solar … Continue reading

Posted in Podcast | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

DHS Cybersecurity Workforce

Secure federal computer systems depend on the federal and contractor workforce who design, develop, implement, secure, maintain, and use them. But the federal government faces a persistent shortage of workers trained in cybersecurity and information technology. The Department of Homeland … Continue reading

Posted in Information Security, Information Technology | Tagged , , , , , | Leave a comment

Cybersecurity—New Risks and Threats

Picture this: Atlanta’s municipal information system was hit with a cyberattack that prevented customers from accessing multiple applications, including paying bills and viewing court-related information. The Department of Justice reported indicting nine Iranians for a massive cybersecurity theft campaign on … Continue reading

Posted in High Risk List, Information Security, Information Technology | Tagged , , , , , , , , | Leave a comment

Who Let the Watchdogs Out? We’re on Location Discussing the Internet of Things (video podcast)

Have you ever used a fitness tracker to measure your daily steps? Or adjusted your home thermostat from your phone? If you answered yes, then you’ve experienced the Internet of Things. If you haven’t heard the term before, the Internet … Continue reading

Posted in About GAO, Information Technology, Podcast, Science and Technology, Technology Assessment, Video | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

Securing the Nation’s Most Sensitive Information (podcast)

High-impact federal information systems hold sensitive information, which, if lost, could cause catastrophic harm to individuals, the government, and the nation. We recently surveyed federal agencies about cyber threats to high-impact systems and efforts to protect them. Listen to Greg … Continue reading

Posted in Podcast | Tagged , , , , , , , , , , , | Leave a comment