Cybersecurity

DOD pushes toward CAC replacement

Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Cybersecurity

Senate Dem wants answers on reported Booz Allen leak

Sen. Claire McCaskill (D-Mo.) wants answers from Booz Allen Hamilton about its security posture and ability to manage sensitive intelligence data.

Cybersecurity

Is government handling zero-days all wrong?

A former cybersecurity advisor to Bush and Obama thinks the Vulnerability Equities Process has its disclosure priorities backwards.

Modernization

Booz Allen, NGA probe intel leak

Defense and intelligence contractor Booz Allen Hamilton and the National Geospatial-Intelligence Agency are investigating how a trove of sensitive program data was apparently uploaded to a public Amazon cloud server.

Cybersecurity

CIA director rips Assange, defends foreign surveillance

In his first public remarks as CIA director, Mike Pompeo defended the work of the agency -- and condemned Wikileaks founder Julian Assange and former intel contractor Edward Snowden for undermining the CIA and national security.

Cybersecurity

Agencies need to talk IT, intel for supply chain

As supply chain management has become a key insider threat, agencies need to reach out to industry for help, said experts.

Cybersecurity

Think like a hacker, says former CISO

Greg Touhill contends that clarity, hacker brains and services consolidation are keys to more secure federal networks and data.

Cybersecurity

Vault 7 leak highlights insider threat

The WikiLeaks release of alleged CIA hacking program data is the latest example of what one former intelligence official says is the greatest cybersecurity challenge: the insider threat.

Digital Government

Russia’s Spear Phishing Tactics in the 2016 Election Are Boring Compared to Its 2008 Hack of the US Military

Long before the world knew the contents of Hillary Clinton staffers’ inboxes thanks to Russian hackers, the country went after an even bigger US target.

Cybersecurity

The proper perspectives on defending against insider threats

The National Industrial Security Policy Operating Manual is a solid start, but agencies and contractors can't approach this as a compliance exercise.

Cybersecurity

Can Trump mend fences with Silicon Valley?

The government needs to make nice with the commercial technology community over lingering mistrust stemming from revelations of surveillance and faulty encryption standards, according to a new report.

Cybersecurity

Legacy systems, hygiene top Air Force 2017 cyber list

The Air Force will prioritize making legacy and mission systems cyber secure and instilling a culture of cyber security in the workforce in 2017, says CISO Pete Kim.

Cybersecurity

Cyber threat grows exponentially, says outgoing official

The number of cyber threats, attacks and criminals continues to grow, says an outgoing White House counterterrorism and cybersecurity advisor, and the new administration must continue developing international cyber norms.

Cybersecurity

DOD paves the way for more hacker research

The Pentagon announced a new policy to put efforts that allow hackers to explore DOD websites for vulnerabilities on firmer legal footing.

Cybersecurity

All's quiet on the election cyber front, so far

Despite earlier hacks and official concerns that Russia or others would seek to sabotage the U.S. elections, there was little sign of malicious cyber activity through most of Election Day. But that doesn't mean all is well.

Cybersecurity

White House official: Cyberthreats continue to multiply

A senior homeland security adviser said cyberthreats are figuring more prominently in the president's daily security briefing.

Cybersecurity

Trump announces plans for Cyber Review Team

In a speech to a veterans group, the Republican presidential nominee offered an outline for his cybersecurity policy.

Cybersecurity

Snowden no hero, says House intel committee

Edward Snowden claims he leaked more than 1 million classified intelligence documents out of concern for Americans' rights, but a new congressional study says he is just a disgruntled employee.

Modernization

Why privilege can be risky

Privileged users, according to a new three-year study sponsored by Forcepoint and performed by the Ponemon Institute, are still a weak point for network security in federal networks.

Cybersecurity

IG: Interior needs to tighten computer security

A new report says the Interior Department needs to strengthen user access controls and mobile encryption.