Podcasts

Critical Update: How CISA Defines ‘Trust’ in the Trusted Internet Connection Policy

Nextgov offers a deep dive into TIC 3 and the purported conflict between CISA’s trust zones and zero-trust security.

Ideas

Taking Risk Out of the System

A view on cybersecurity coordination from across the pond.

Cybersecurity

CISA Significantly Expands List of 'Essential Critical Infrastructure' Workers

The expanded list includes workers who may need to continue operating despite stay-at-home orders.

Digital Government

DHS Makes a Master List of Knowns and Unknowns of COVID-19 Outbreak

The agency developed the master question list as a reference for government decision-makers.

Emerging Tech

ICE Wants to Connect Its Facial Recognition System With a Pennsylvania County’s Gang Intel App

Immigration and Customs Enforcement wants to develop an offshoot of Lehigh County’s Gang Intelligence App over the next year.

Cybersecurity

Regulators Say Maritime Industry’s Pandemic Plans Can Skip Cybersecurity Details

The Coast Guard stresses new guidance adds flexibility for compliance with existing security planning requirements.

Cybersecurity

Policymakers Look to Greatly Expand Existing Cyber Workforce Programs

Tracking how education initiatives translate into cybersecurity jobs remains a challenge.

Cybersecurity

Senate Committee OKs Bill to Give CISA Subpoena Authority Over Internet Service Providers

Lawmakers are pushing to give the agency more power and resources despite the cuts requested in the president's budget.

Cybersecurity

Solarium Cyber Report Recommends New Government Structures, Major Policy Overhauls

Nonpartisan group recommends a new bureau to track cybersecurity metrics across government and the private sector.

Digital Government

Agencies Warn of Coronavirus-Related Scams  

The government is trying to curb scammers preying on the public’s fears.

Cybersecurity

Former DHS Acting Inspector General Indicted for Stealing Database with Personnel Information

The 16-count indictment includes charges of theft of proprietary software and intent to defraud the U.S. government.

Modernization

Real Work on TIC 3 Begins After Draft Guidance Is Finalized, Says Lead Official

Agencies are piloting some potential additional use cases in the background, which the TIC program office plans to start digging into this summer.

Cybersecurity

CISA Officials See ‘No Malicious Activity’ During Super Tuesday

Subsequent information could change the analysis but the agency does not currently attribute technical hiccups in some states to interference.