Cybersecurity

Navigating NSA's Commercial Solutions for Classified program

Although the CSfC program is meant to streamline the certification process, primers like the one produced by the Institute for Critical Infrastructure Technology further simplify it.

Modernization

NSA official: ICITE could boost metadata capabilities

Regardless of the source of metadata, "you're going to get improvements by merit of how the data is tagged and how the attributes are assigned," NSA Deputy CIO Sally Holcomb said.

Cybersecurity

NSA cyber exercise hones skills at military academies

Fifteen years since its inception, the Cyber Defense Exercise has added new dimensions, including the hacking of drone communications.

Cybersecurity

NSA overhaul includes acquisition

"We increasingly need to reach out to commercial companies," many of which are unfamiliar with federal acquisition regulations, said Jennifer Walsmith, NSA's senior acquisition executive.

Cybersecurity

The Pentagon wants to be hacked -- and learn from it

DOD has its own "red teams" that probe sensitive defense networks for vulnerabilities, but the Hack the Pentagon initiative goes a significant step further by inviting private-sector hackers to get out their digital scalpels.

Cybersecurity

Rogers: Silicon Valley can benefit from CYBERCOM outreach

"If we can't generate value for both [sides], that's not a partnership," Adm. Michael Rogers, head of U.S. Cyber Command, said at the annual RSA conference in downtown San Francisco.

Cybersecurity

Intel officials dwell on encryption as a potential security problem

FBI Director James Comey and other senior intelligence leaders told Congress that the use of encrypted communications by terrorists and other adversaries remains a problem for investigators.

Cybersecurity

NSA’s Information Assurance Directorate at a crossroads

Although often overshadowed by the far bigger Signals Intelligence Directorate, IAD’s mission of protecting sensitive information on government networks is more important than ever.

Cybersecurity

Rogers: Cyber Command capabilities at 'tipping point'

The Pentagon's cyber mission force is developing more "tangible" capabilities "that you will see us start to apply in a broader and broader way," said Adm. Michael Rogers, head of NSA and Cyber Command.

Cybersecurity

U.S. discloses zero-day exploitation practices

The government officially revealed that it uses undisclosed vulnerabilities in commercial software for surveillance and offensive cyber purposes.

Cybersecurity

What's missing in the new NSA report?

The NSA released a required report on surveillance transparency, but many questions remain unanswered about how the spy agency is querying vast troves of telephonic metadata.

Cybersecurity

Clinton calls for 'Manhattan-like project' on encryption

Clinton has elevated her voice among current and former Obama administration officials warning of the potentially dire consequences of "going dark."

Cybersecurity

Rogers pushes NSA to lead on ICITE, previews agency reorg

The National Security Agency's technological prowess means the agency must lead on an intelligence community-wide IT architecture, Director Adm. Michael Rogers said Dec. 15.

Modernization

NSA's bulk data program is shut down

The National Security Agency is replacing a controversial spying program with a new data collection regime approved under the USA Freedom Act.

Cybersecurity

NSA chief says agency discloses '91 percent' of zero day bugs

The National Security Agency last year disclosed to the private sector about 91 percent of previously unknown software vulnerabilities the agency discovered, according to NSA Director Adm. Michael Rogers.

Cybersecurity

Former NSA chief: Data manipulation an 'emerging art of war'

Adversaries' ability to manipulate the content of stored data, a phenomenon that is high on U.S. officials' radar, is an "emerging art of war in cyberspace," former NSA director and retired Gen. Keith Alexander told FCW.

Cybersecurity

NSA director warns of cyber threats

Gen. Keith Alexander cites need for access to information to thwart attacks.

Cybersecurity

Choosing a mobile development strategy for your agency

Here are some of the pros and cons of native vs. Web-based apps.