Digital Government
Grassley questions Defense secretary’s personal email use
Sen. Charles Grassley (R-Iowa) is concerned that use of personal email for official business by Defense Secretary Ash Carter poses security risks.
Cybersecurity
Former DOE employee pleads guilty to attempted spear-phishing
Charles Harvey Eccleston, who was fired by the Nuclear Regulatory Commission in 2010, offered to sell a list of 5,000 email addresses of purported NRC employees to undercover FBI agents posing as representatives of a foreign government, the DOJ statement said.
Cybersecurity
Pentagon chief: 2017 budget includes $7B for cyber
Defense Secretary Ash Carter said the money would be used to better train cybersecurity personnel and develop more offensive tools.
Cybersecurity
Despite progress, DOD systems still vulnerable to hacking
A new report says teams that tested the cybersecurity of DOD networks were "frequently in a position to deliver cyber effects that could degrade the performance of operational missions."
Cybersecurity
Army cyber chief: Invest in Internet of Things research
"People are connecting stuff to the Internet that we never thought would be connected," said Lt. Gen. Edward Cardon, head of Army Cyber Command.
Cybersecurity
Carter calls on Cybercom to intensify online push against ISIS
A year and a half into the U.S. military campaign, the Islamic State group's cyber capabilities are not as menacing as some had feared.
Cybersecurity
NIST looks to strengthen crypto backbone
NIST is looking to increase trust in the technical underpinnings of encryption, by strengthening cryptographic random bit generators.
Cybersecurity
DHS adds traffic tool to intrusion-prevention program
The Netflow Analysis tool will help identify malicious traffic on private networks, said Andy Ozment, DHS' assistant secretary for cybersecurity and communications.
Cybersecurity
CBP encouraged by facial comparison pilots
Customs and Border Protection officials are seeing success in facial comparison pilot projects and are mulling a long-term investment strategy for the program, according to CBP's Michael Hardin.
Cybersecurity
Gauging North Korea's cyber operations
With reports this week of South Korea being on high alert for cyberattacks from the North, a new CSIS report examines what Kim Jong Un's regime is capable of in the digital realm.
Cybersecurity
NSA’s Information Assurance Directorate at a crossroads
Although often overshadowed by the far bigger Signals Intelligence Directorate, IAD’s mission of protecting sensitive information on government networks is more important than ever.
Cybersecurity
Congress wants answers on Juniper breach
Lawmakers on the House Oversight and Government Reform Committee are asking leaders of major federal agencies to produce any evidence that they used the compromised Juniper products.
Modernization
DISA releases cloud access point guidance
The Cloud Connection Process Guide incorporates feedback from recent DOD cloud pilots and describes the process of registering defense agencies' cloud usage.
Modernization
Army to test crucial software tools
The new tools will help soldiers configure and defend the global Warfighter Information Network-Tactical.
Digital Government
Wanted: agile robots
NIST is looking for new agility in robotic design, including smart manufacturing techniques and component interoperability.
Cybersecurity
Pentagon delays cyber contracting requirements
The two-year delay will give contractors time to adapt to a shifting landscape in cybersecurity requirements that has been characterized as a maze of piecemeal regulations.
Cybersecurity
Rogers: Cyber Command capabilities at 'tipping point'
The Pentagon's cyber mission force is developing more "tangible" capabilities "that you will see us start to apply in a broader and broader way," said Adm. Michael Rogers, head of NSA and Cyber Command.
Cybersecurity
U.S. official: Russian cyberwarfare getting more sophisticated
Robert Giesler, chief of strategy and plans in the secretary of Defense's Strategic Capabilities Office, believes Russia's use of cyberwarfare has grown more sophisticated, from Estonia in 2007 to Ukraine in 2016.
Cybersecurity
FDA issues draft guidance for medical device vulnerabilities
Security can be built into the design of a product, but risks can surface throughout its life cycle, the agency said in announcing the draft guidance.
Cybersecurity
Prisoner swap frees Iranian hacker
The release of an Iranian man charged with hacking an American defense firm was a reminder that cyberspace has been a flashpoint in the often-tense U.S./Iran relationship.
Almost There!
Help us tailor content specifically for you: