Cybersecurity

CMMC Official Backs Light-touch Option for Continuous Monitoring of Defense Contractors’ Cybersecurity

The Pentagon’s certification program is looking for a way to keep tabs on companies during the three-year intervals between independent audits.

Cybersecurity

Was the Pentagon’s Blacklist of Chinese Companies Justified?

An independent study of the list found China uses its favored companies to wipe out competition and spread economic influence.

Ideas

Racing the Clock on Election Security

There are less than 100 days left until the presidential election.

Ideas

A Test and Trace Strategy for Reconnecting to Government Networks

Agencies shifted to large-scale work from home operations but little thought has been given to how to secure these networks when workers return to the office. 

Cybersecurity

The Liability Plan to Hold Software Producers Accountable for Cybersecurity 

A key congressman explains one of the Cyberspace Solarium Commission’s loftier recommendations.

Cybersecurity

DISA to Release Zero-Trust Model This Year

Vice Adm. Nancy Norton said the Defense Department must take a data-centric approach to protecting its networks.

Ideas

Combatting Mobile Threats in a New Reality

Security starts with users understanding what types of attacks they will encounter and how to manage them.

Cybersecurity

White House Cites Intel Sharing Efforts in NDAA Veto Threat

The related provisions would implement major recommendations from the Cyberspace Solarium Commission. 

Cybersecurity

Two Chinese Nationals Indicted for Stealing Trade Secrets, Coronavirus Research

Federal prosecutors allege the pair hacked into corporations and research institutions on behalf of the Chinese government.

Ideas

Cyber Hygiene is the Key to CMMC Compliance Preparedness

The challenge is that many contractors don’t have full visibility into their organization’s network and security.

Ideas

Ransomware Criminals Are Targeting U.S. Universities

The schools are attractive targets because of weak cybersecurity measures and medical research data.

Cybersecurity

Wednesday’s Hack Shows that The Whole World Is in Your Twitter DMs

We treat direct messages on Twitter as private conversations. Last night’s hack shows that isn’t the case.

Cybersecurity

U.S., U.K. Officials Call for Russia to Stop Hacking COVID-19 Researchers

“It is completely unacceptable that the Russian Intelligence Services are targeting those working to combat the coronavirus pandemic,” a British official said.

Artificial Intelligence

Attorney General: China May Supplant U.S. If It Wins AI Race

William Barr blasted Google, Microsoft and other American big tech companies for being short-sighted while meeting the Chinese government’s demands for operating within the country. 

Ideas

The Electoral College Is Surprisingly Vulnerable to Popular Vote Changes

This system is built to virtually ensure narrow victories, making it very susceptible to efforts to change either voters’ minds or the records of their choices.

Cybersecurity

Bipartisan Concerns Arise Over Cyber Director Legislation

Proponents say the new position would help balance and deconflict offensive and defensive operations.

Ideas

Why Government Needs to Move Quickly to Zero Trust

Most experts agree that the best path forward would be zero-trust networking, although the concept is defined differently depending on who you happen to ask.