Cybersecurity

Army announces bug bounty program

Based on the "Hack the Pentagon" bug bounty program, the Army's effort will let military personnel and government civilians find vulnerabilities in the Army's recruiting websites.

Cybersecurity

Why cyber needs to be front and center in the transition

Experts warn that past transitions have ignored the lessons learned by outgoing administrations, and the stakes are so high now that the Trump Administration needs to heed the advice of Obama's cyber officials.

People

Nicole E. Wilson

Contracting Officer's Representative and Management Analyst, Computer Hardware, Enterprise Software and Solutions, Department of the Army

People

Marc A. Santoro

Deputy Lead, Electromagnetic Railgun Fire Control Integrated Product Team, Naval Surface Warfare Center, Dahlgren Division, Department of the Navy

People

Nick M. Murray

Public-Sector Strategist for CDM and Cloud Programs, Splunk

People

Lt. Themba D. Hinke

Navy Engineering Duty Officer and Project Manager for the Space and Naval Warfare Systems, Command's Space Field Activity, National Reconnaissance Office

People

Matthew Derenski

IT Cybersecurity Engineer, Office of the CIO, Jet Propulsion Laboratory, NASA

Acquisition

Emily E. Antos

Assistant Program Manager, Engineering Sea Warrior Program, Space and Naval Warfare Systems Center Atlantic, Department of the Navy

Acquisition

Palantir ruling could tweak Army's innovation track

Two top Army officials reflect on some of the innovation accomplishments of the Obama administration and the challenges that lie ahead for the incoming Trump administration.

Cybersecurity

All's quiet on the election cyber front, so far

Despite earlier hacks and official concerns that Russia or others would seek to sabotage the U.S. elections, there was little sign of malicious cyber activity through most of Election Day. But that doesn't mean all is well.

Digital Government

Despite hype, level of election cyberthreats is uncertain

As Americans go to the polls to vote in a hotly contested election, federal officials will be behind the scenes watching for malicious cyber activity, even though there won't be much they can do in response.

Modernization

IOC just a first step for Cyber Mission Force

The 133 Cyber Mission Force teams called for in DOD's Cyber Strategy have reached initial operating capability, but the U.S. military is still a long way from being able to dominate the cyber domain.

Cybersecurity

Army CyberCom looks to boost training

The new head of the Army Cyber Command says the command has made significant progress in recent years, but needs to focus on identifying and recruiting new talent and making training programs more realistic for cyber forces.

Cybersecurity

DOD, DHS chart paths to acquisition innovation

DOD and DHS are both trying to tap into the best the tech sector has to offer, and each agency has new and experimental contracting mechanisms that are showing signs of short-circuiting existing procedures.

Modernization

DOD CIO: Recent GAO criticism of JIE is off base

Halvorsen says GAO's report criticizing the management and oversight of the Joint Information Environment initiative fails to understand the nature of the project.

Digital Government

DOD to create chief innovation officer position

Defense Secretary Ash Carter is implementing some of the initial recommendations of the Defense Innovation Board, including the creation of a new position to drive innovation efforts.

Cybersecurity

CIA to put millions of declassified documents online

The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.

Modernization

DOJ releases controversial cybercrime prosecution memo

More than two years after Attorney General Eric Holder penned a memo to federal prosecutors offering guidance on pursuing cases under the Computer Fraud and Abuse Act, litigation prompted the DOJ to release the document to the public.

Cybersecurity

Finalizing cyber incident response might be easier than deciding when to use it

The revised National Cyber Incident Response Plan is on track to be completed by the end of the year, but the more difficult challenge might be determining when a cyber incident reaches a threshold that activates the plan.

Digital Government

DOD service chiefs survey the threat landscape

As the Obama administration nears its end, the service secretaries say technological threats will continue to grow and the DOD must reform how it develops systems and its workforce to keep pace with adversaries.