The Department of Transportation (DoT) Office of Inspector General (OIG) completed a quality control review (QCR) of KPMG’s report on DoT’s compliance with the Digital Accountability and Transparency Act of 2014 (DATA Act), and concurred with KPMG’s four recommendations to improve the agency’s compliance with the DATA Act.
Numerous Federal agencies are springing into action in response to the ransomware attack on Colonial Pipeline Company, a major supplier of fuel to the northeastern U.S. that temporarily shut down pipeline operations after disclosing the attack on May 7.
The Transportation Security Administration (TSA) is looking to improve its airport screening technology – and its use of machine learning within that technology – in an effort to make the process easier and faster for travelers while enhancing security effectiveness.
President Biden announced plans for two key technology nominations on April 22, tapping Asmeret Berhe as nominee for director of the Office of Science at the Department of Energy (DoE), and Robert Hampshire as nominee for assistant secretary for research and technology at the Department of Transportation (DoT).
With the Biden administration taking office Jan. 20, the Federal CIO Council has named acting CIOs at five of the seven agencies where the position is helmed by political appointees who are obliged to step down at the end of presidential administrations.
The U.S. Department of Transportation (DOT) Office of Inspector General (OIG) said in a memorandum that it plans to audit the security of the Federal Transit Administration’s (FTA) financial management systems.
The Federal Transportation Administration (FTA) is offering up $10 million in funding to research how COVID-19 spreads on public transit.
Looking ahead to a post-pandemic future, Department of Transportation (DoT) CIO Ryan Cote said at MeriTalk’s October 7 CIO Crossroads webinar that the workplace structure will be forever changed as organizations and Federal agencies realize the value of technology implemented throughout the mass shift to remote work.
The Transportation Security Administration (TSA) is seeking other means to identify airline passengers when they cannot provide acceptable identity documentation.
The House Appropriations Subcommittee on Transportation, Housing and Urban Development (HUD), and Related Agencies has approved a $158.3 billion appropriations bill for fiscal year 2021.
The unique ability of government IT operations to ensure the delivery of vital services to citizens has formed the backbone of the larger Federal pandemic response. MeriTalk is chronicling the untold stories of that effort in our CIO Crossroads series. Please join us for our latest chapter: Department of Transportation.
In a letter to the Department of Transportation (DoT) and the Federal Aviation Administration (FAA), Sens. Catherine Cortez Masto, D-Nev., and Jacky Rosen, D-Nev., called for the expansion of drone use to facilitate contact-free delivery of medical supplies and other needed equipment during the COVID-19 pandemic.
With nearly 1.5 million drones and 160,000 remote pilots now registered with the Federal Aviation Administration (FAA), the administration continues to look for new ways to ensure safety and security in U.S. airspace. To that end, the FAA announced its industry partners that will help the Federal government establish requirements for future suppliers of Remote Identification (Remote ID).
The U.S. Government Accountability Office (GAO) suggests that the Transportation Security Administration (TSA) update its Baseline Assessment for Security Enhancement (BASE) cybersecurity template to reflect key cybersecurity practices.
The Department of Transportation’s Office of the Inspector General (OIG) announced in a March 4 memo that it will conduct an audit of the Federal Aviation Administration’s (FAA) security controls to protect 50 information systems where a breach would have a “catastrophically adverse effect.”
In a report released Feb. 25, the Government Accountability Office (GAO) said that “most” of nine agencies tasked with protecting the 16 critical infrastructure sectors “have not developed methods to determine the level and type of adoption of the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity.”