Cybersecurity

Pentagon to Scrub Kaspersky From Defense Systems Following DHS Ban

The Defense Department is following a DHS directive to remove the Russian anti-virus from its systems but it’s not clear if the software was there in the first place.

Ideas

How to Prepare for More Attacks from Leaked NSA Tools

As the Shadow Brokers continue selling off hacking tools, organizations need to be prepared for hard-to-detect attacks.

Modernization

NSA Quietly Awarded a Classified $2.4 Billion Tech Contract With More to Come

CSRA wins the NSA’s Groundbreaker recompete to modernize portions of the intelligence community’s IT infrastructure

Cybersecurity

Homeland Security Adviser Urges Congress to Renew Controversial Surveillance Power

Tom Bossert warned letting Section 702 of the Foreign Intelligence Surveillance Act sunset would have grave security consequences.

Cybersecurity

What the Announced NSA/Cyber Command Split Means

Cyberwar and cyber intelligence are diverging, as are Cyber Command and the NSA. Here’s what that means for the man who leads both entities, the future of signals intelligence collection, and cyberwarfare.

Cybersecurity

Trump Order Elevates Cyber Command

CYBERCOM is now a full combatant command rather than a sub-unified command beneath U.S. Strategic Command.

Emerging Tech

NSA Updates List of Tech Ready For Commercialization

The agency's portfolio of technology focuses on challenges in big data, cyber, internet of things and mobility.

Cybersecurity

Who Are the Shadow Brokers?

What is—and isn’t—known about the mysterious hackers leaking National Security Agency secrets

Cybersecurity

Cyberwar Is Officially Crossing Over Into the Real World

Online warfare already wreaks havoc on the physical world, and it's only going to get worse.

Cybersecurity

Cybersecurity So Bad, It Makes You WannaCry

There are many interesting elements about the ransomware attack, the biggest being the tools to stop it were readily available.

Cybersecurity

NSA Engaged in Massive Battle with Russian Hackers in 2014

An NSA official previously described the toe-to-toe battle but placed it in 2015.

Cybersecurity

Once Stealthy, Russian Hackers Now Go Toe to Toe with U.S. Defenders

Once wary of being spotted, Russian government hackers now battle with their U.S. adversaries.

Cybersecurity

Government Contractor Accused of Stealing NSA Cyber Secrets

Harold Thomas Martin III worked for at least seven private contractors since 1993, placing him in several defense and intelligence agencies that require security clearances.

Cybersecurity

Bill to Elevate CYBERCOM Heads to Obama’s Desk

The compromise defense policy bill also sets conditions for splitting NSA and U.S. Cyber Command.

Cybersecurity

Compromise Defense Policy Bill Elevates Cyber Command

The bill, which could be voted on this week, also places restrictions on splitting CYBERCOM from NSA.

Cybersecurity

Report: Government’s Zero Days Arsenal is in the Dozens

The Columbia University report advocates more transparency about the government review process for previously unknown computer vulnerabilities.