Policy
Effort to Develop Open Standards for 5G Moves in Intelligence Authorization Act
The bill cleared committee with one conspicuous hold out over an unsustainable proliferation of government secrets.
Artificial Intelligence
TSA Issues Road Map to Tackle Insider Threat With Artificial Intelligence
The agency says protection of privacy and civil liberties will be a guiding principle.
Cybersecurity
Federal Officials: Tackling the ‘Most Insidious’ Cyber Threat Takes Looking After Workers
Insider threat is seen as the primary attack vector for intellectual property theft and was reportedly on the rise last year.
Cybersecurity
Congressman floats 'FITARA-like' scorecard to measure security clearance process
A significant reduction in the backlog of security clearance investigations over the past two years has contractors feeling more optimistic, but concerns about lengthy adjudications and reciprocity between federal agencies still linger.
Cybersecurity
TIC 3.0 and zero-trust networking
Commentators on the new Trusted Internet Connection policy have noted that "zero-trust" strategies might not be a perfect fit.
Cybersecurity
TSA to roll out strategic plan for insider threats next month
Acting Deputy TSA Administrator Patricia Cogswell said that as screening tech has improved, insider threats have become an increasingly attractive attack vector for bad actors.
Cybersecurity
CISA touts CDM, CyberStat as key cyber compliance tools
A watchdog report found DHS doesn't always validate whether agencies are complying with mandatory directives. The department floated plans to leverage two existing program to do just that.
Cybersecurity
IC merging suitability and clearance reviews
The Office of the Director of National Intelligence says the move will strengthen human resources officers' role in hiring for nation's most sensitive positions.
Cybersecurity
Air Force Could Tap Into Individuals’ Online Data to Combat Insider Threats
The request for information stems from an executive order issued in 2011.
Modernization
AWS lawsuit alleges 'improper pressure' from Trump on JEDI
President Donald Trump personally steered a $10-billion cloud computing contract away from frontrunner Amazon Web Services out of personal and political animus against Amazon founder Jeff Bezos, according to the details of a lawsuit released publicly Dec. 9.
Cybersecurity
Navy CIO talks innovation, cybersecurity and CMMC
Navy CIO Aaron Weis said DOD's upcoming unified cyber standard will help close the innovation gap by adopting industry standards, but ultimately the onus is on the Defense Department to set the tempo.
Cybersecurity
Industry seeks more liability protections for threat info
Commercial providers of technology and infrastructure want more federal protection to share specific cyber threat information about risky products and services.
Cybersecurity
Background checks move to DOD
The government’s background investigations agency with some 3,000 employees has moved from the Office of Personnel Management to the Defense Counterintelligence and Security Agency.
Cybersecurity
Justice Department Charges Edward Snowden With Violating Non-Disclosure Agreements
Prosecutors are seeking to prevent the former NSA contractor from profiting from his unauthorized release of classified information.
Ideas
Happy Insider Threat Awareness Month!
Insider threats are potentially far more dangerous than those attacking from outside.
Acquisition
DOD releases unified cybersecurity standard for contractors
The Defense Department's Cybersecurity Maturity Model Certification framework is ready for public comment.
Digital Government
China’s Spies Are on the Offensive
China’s spies are waging an intensifying espionage offensive against the United States. Does America have what it takes to stop them?
Cybersecurity
CISA official touts data sharing in critical infrastructure
Where privately owned critical infrastructure providers had balked at sharing threat data five years ago, it's become now a critical, commercial necessity, according to CISA infrastructure official.
Acquisition
Contractors have questions about DOD's cyber requirements
The Pentagon is making big moves to improve cybersecurity in its industrial base, but the contracting community and experts continue to wonder if it will all play out as intended.
Cybersecurity
USAF pays out $123K in 3-month bug bounty contest
The Air Force found 54 vulnerabilities following its first assessment focusing on continuous monitoring of the cloud-based Common Computing Environment.
Almost There!
Help us tailor content specifically for you: