IT Contracting

Experts warn that OMB’s AI guidance could slow federal adoption of the emerging tech

Commentators say proposed definitions of “rights-impacting” and “safety-impacting” use cases could wind up saddling low-impact AI programs up with high-impact controls.

GSA is at a ‘critical juncture’ to salvage faith in TTS, agency watchdog warns

GSA’s inspector general says that it’s “trying to prevent the next Login.gov” — referencing a bombshell oversight report on GSA’s single sign-on service issued earlier this year.

IRS starts the bidding for $1.9B IT services recompete

The tax collection agency is undertaking this recompete amid its broader push to overhaul the entire tech environment, which includes systems first stood up in the 1960s.

OPM puts data at the center of human capital modernization

Contractors should focus on data standards as they develop solutions, a senior Office of Personnel Management official says.

National intelligence strategy calls for new partnerships to harness emerging technologies

Federal agencies must collaborate with private sector partners and allies to better understand the implications of emerging technologies, according to the new strategy.

Third-party contractor software exploited in attack on HHS data

An official with the Health and Human Services Department said attackers gained access to data by exploiting a major vulnerability found in the popular MOVEit file transfer service.

What Motivates Remote Workers to Protect IT Assets?

Researchers found that fear of what could go wrong is the primary driver in getting remote workers to protect IT systems.

OPM Watchdog Seeks a Background Search Tool to Help Investigations

The Office of Personnel Management’s Inspector General asked industry to offer insights about a potential online search and retrieval service to help with its investigations.

Air Force Software Factory Looks to Unleash 'Chaos' on Civilian IT Shops

The Kessel Run group is currently developing a playbook that would make it easier for organizations across the federal government to adopt engineering and security best practices.

For Defense IT, Acquisitions Need to Be More Than 'Just in Time'

Contract planning and boosting small business in 2022 are top of mind for Debra Daniels, the vice procurement services executive for the Defense Information Systems Agency.

'Limited' Progress Made on the Pentagon's Plan to Deliver Real-Time Acquisition Data, Report Says

The Government Accountability Office found that the Defense Department's efforts to move to a new more automated, web-based reporting system have been limited despite plans to adopt a new system by fiscal 2022.

A Modernized IT Dashboard is Set to Launch in Mid-March

The legacy 2009 website containing schedule, spending and risk data for federal IT projects is offline while a modernized replacement is finalized.

The Army's Top Buyer Wants to Test the Limits of Flexible Software Spending

Douglas Bush, the Army's newly confirmed acquisition chief, wants to do more to reform how the service buys and sustains software.

Agencies Shouldn't Use Facial Recognition for ID Verification, Groups Say

More than 45 organizations signed onto a letter asking government agencies to stop their use of ID.me or any facial recognition for identity verification, and Senate Democrats are also still asking questions.

The Defense Industry is Struggling with Capacity, Report Says

In its annual Vital Signs report for 2022, the National Defense Industrial Association, found that disruptions from COVID-19 continued to exacerbate workforce challenges.

Agencies Are Tapping a Facial Recognition Company to Prove You’re You. That Raises Concerns about Privacy, Accuracy and Fairness

Federal and state governments are turning to a facial recognition company to ensure that people accessing services are who they say they are. The move promises to cut down on fraud, but at what cost?

The SEC Looks to Expand Cyber Coverage

The Securities and Exchange Commission is taking a new look at how it asks publicly traded companies to disclose cybersecurity risks.