Cybersecurity
DOD pushes toward CAC replacement
Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.
Cybersecurity
Senate Dem wants answers on reported Booz Allen leak
Sen. Claire McCaskill (D-Mo.) wants answers from Booz Allen Hamilton about its security posture and ability to manage sensitive intelligence data.
Cybersecurity
Is government handling zero-days all wrong?
A former cybersecurity advisor to Bush and Obama thinks the Vulnerability Equities Process has its disclosure priorities backwards.
Modernization
Booz Allen, NGA probe intel leak
Defense and intelligence contractor Booz Allen Hamilton and the National Geospatial-Intelligence Agency are investigating how a trove of sensitive program data was apparently uploaded to a public Amazon cloud server.
Cybersecurity
CIA director rips Assange, defends foreign surveillance
In his first public remarks as CIA director, Mike Pompeo defended the work of the agency -- and condemned Wikileaks founder Julian Assange and former intel contractor Edward Snowden for undermining the CIA and national security.
Cybersecurity
Agencies need to talk IT, intel for supply chain
As supply chain management has become a key insider threat, agencies need to reach out to industry for help, said experts.
Cybersecurity
Think like a hacker, says former CISO
Greg Touhill contends that clarity, hacker brains and services consolidation are keys to more secure federal networks and data.
Cybersecurity
Vault 7 leak highlights insider threat
The WikiLeaks release of alleged CIA hacking program data is the latest example of what one former intelligence official says is the greatest cybersecurity challenge: the insider threat.
Digital Government
Russia’s Spear Phishing Tactics in the 2016 Election Are Boring Compared to Its 2008 Hack of the US Military
Long before the world knew the contents of Hillary Clinton staffers’ inboxes thanks to Russian hackers, the country went after an even bigger US target.
Cybersecurity
The proper perspectives on defending against insider threats
The National Industrial Security Policy Operating Manual is a solid start, but agencies and contractors can't approach this as a compliance exercise.
Cybersecurity
Can Trump mend fences with Silicon Valley?
The government needs to make nice with the commercial technology community over lingering mistrust stemming from revelations of surveillance and faulty encryption standards, according to a new report.
Cybersecurity
Legacy systems, hygiene top Air Force 2017 cyber list
The Air Force will prioritize making legacy and mission systems cyber secure and instilling a culture of cyber security in the workforce in 2017, says CISO Pete Kim.
Cybersecurity
Cyber threat grows exponentially, says outgoing official
The number of cyber threats, attacks and criminals continues to grow, says an outgoing White House counterterrorism and cybersecurity advisor, and the new administration must continue developing international cyber norms.
Cybersecurity
DOD paves the way for more hacker research
The Pentagon announced a new policy to put efforts that allow hackers to explore DOD websites for vulnerabilities on firmer legal footing.
Cybersecurity
All's quiet on the election cyber front, so far
Despite earlier hacks and official concerns that Russia or others would seek to sabotage the U.S. elections, there was little sign of malicious cyber activity through most of Election Day. But that doesn't mean all is well.
Cybersecurity
White House official: Cyberthreats continue to multiply
A senior homeland security adviser said cyberthreats are figuring more prominently in the president's daily security briefing.
Cybersecurity
Trump announces plans for Cyber Review Team
In a speech to a veterans group, the Republican presidential nominee offered an outline for his cybersecurity policy.
Cybersecurity
Snowden no hero, says House intel committee
Edward Snowden claims he leaked more than 1 million classified intelligence documents out of concern for Americans' rights, but a new congressional study says he is just a disgruntled employee.
Modernization
Why privilege can be risky
Privileged users, according to a new three-year study sponsored by Forcepoint and performed by the Ponemon Institute, are still a weak point for network security in federal networks.
Cybersecurity
IG: Interior needs to tighten computer security
A new report says the Interior Department needs to strengthen user access controls and mobile encryption.
Almost There!
Help us tailor content specifically for you: