Cybersecurity
Unmonitored networks put US nuclear arsenal at risk, GAO finds
A Government Accountability Office report found that the Energy Department cannot effectively monitor potential insider threats to U.S. nuclear security because department staff “have not identified the total number of DOE’s stand-alone classified networks.”
Cybersecurity
Jury: Former DHS watchdog official stole software, employees’ personal info
The verdict is in for the last holdout in a scandalous scheme to defraud the government.
Digital Government
Jury: Former DHS Watchdog Official Stole Software, Employees’ Personal Info
The verdict is in for the last holdout in a scandalous scheme to defraud the government.
Ideas
Modernizing Federal Cybersecurity Must Go Beyond Nation-State Defense
Insider risk can’t be overlooked.
Modernization
Click ‘Like’, Get Punished Under Pentagon’s New Anti-Extremism Policy
First update since 2012 adds rules for social-media behavior.
Cybersecurity
White House embeds cyber EO in FISMA reporting
Federal agencies will be reporting on zero-trust adoption and automation efforts in their annual cybersecurity reports to the Office of Management and Budget.
Cybersecurity
Zero-trust has a branding problem
A zero-trust approach to cybersecurity is intended to increase vigilance and minimize risk, but without the necessary context, the concept could raise discomfort or even hostility among federal workers.
Digital Government
DDS Security Clearance Tool Evolves into ‘SITH’ Insider Threat Program
The Defense Digital Service’s automated investigations tool turns to the dark side of insider threat hunting and gets rebranded to match.
Cybersecurity
Zero trust, EMS top Air Force cyber priorities
Lt. Gen. Timothy Haugh, the commander of the 16th Air Force, said implementing zero trust principles was "foundational" to improve data use and mitigate vulnerabilities from the defense industry supply chain.
Ideas
3 Essential Steps in Implementing a Comprehensive User Monitoring Program
Agencies must implement a comprehensive user monitoring program that effectively combines the human intelligence and artificial intelligence.
Cybersecurity
Microelectronics supply chain challenges and zero trust
When it comes to microelectronics supply chain, better security risk assessment as manufacturers base contend with ongoing threats.
Cybersecurity
Background Check Agency Wants a Social Media Search Tool
The Defense Department office charged with investigating potential insider threats wants to use social media to add context to allegations.
Cybersecurity
Agency zero trust does not start from point zero
The good news is that consistent IT policy spanning previous presidential administrations has allowed the federal government to slowly put the necessary building blocks in place for the inevitable zero trust architecture journey.
Cybersecurity
Small businesses ask Congress to focus CMMC on primes and DOD
Jonathan Williams, a partner at the Washington, D.C.-based law firm PilieroMazza, told lawmakers much of small businesses concerns could be assuaged if DOD and prime contractors shoulder the burden.
Cybersecurity
Supreme Court narrows scope of hacking law, but questions remain
The Supreme Court's ruling on Thursday decided a police officer did not violate a 1980s anti-hacking law, but the court ultimately left open questions about the Computer Fraud and Abuse Act's applicability for other purposes such as cybersecurity research.
Cybersecurity
Army wants teleworkers to switch off smart IoT devices
The Army announced it would require all military, civilian, and contractors to rid their telework environments of internet of things devices, such as smart TVs and speakers.
Digital Government
DHS Launches Internal Probe to Root Out 'Domestic Violent Extremism' Within Its Ranks
Department will work "with urgency and focus to address" insider threats, secretary says.
Modernization
Supply chain risk: Addressing a multitude of single points of failure
As recent attacks have demonstrated, supply chain risks extend to the software and update process as well.
Ideas
Defending Against Cybersecurity Moles Inside Your Agency
The move to a virtual workforce has been a boon to industrious hackers.
Cybersecurity
GSA Could Be Vulnerable to Security Threats From ‘Trusted Insiders’
Watchdog finds gaps in a program meant to protect personnel, facilities, operations and resources.
Almost There!
Help us tailor content specifically for you: