Matt Goodrich, FedRAMP director, and Ashley Mahan, FedRAMP evangelist, addressed industry feedback to FedRAMP’s recently released authorization boundary guidance during a webinar today. […]
A large group of former Federal government officials–including national security and other experts from the Departments of State, Homeland Security, and Justice–urged Secretary of Commerce Wilbur Ross in a letter released yesterday to disclose the 2020 Census’ data protection and cybersecurity policies. […]
CGI Federal has won a task order worth an estimated $530 million to provide services under the Continuous Diagnostics and Mitigation (CDM) Program to CDM’s Group C Federal agencies, a CGI spokesperson confirmed today. […]
The Hide ‘N Seek (HNS) Internet of Things (IoT) botnet, which initially targeted home routers, IP cameras, and video recorders, has been expanded by cybercriminals to target two NoSQL database servers, making it a cross-platform botnet. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
Lawmakers last Wednesday decried a surreptitious industry effort to correct longstanding hardware vulnerabilities affecting nearly all modern computer processors. The reason? The Federal government didn’t get the memo. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
Amid mounting concern about attacks by foreign adversaries on the Department of Homeland Security’s supply chain, two House subcommittees met today to discuss that threat and legislation proposed by the White House–the Federal Information Technology Supply Chain Risk Management Improvement Act–that would respond to the problem. […]
Department of Defense (DoD) Chief Information Officer Dana Deasy said today at the Defense Systems Summit that he has identified four “key strategic areas” that will work to support the National Defense Strategy (NDS). Those four areas – cloud, artificial intelligence, C3 (command, control, and communications), and cybersecurity – are organized not in order of importance, but rather “order of integration,” Deasy said, with each of the priorities flowing from the prior one. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
Paul Craft, director of operations at the Joint Force Headquarters Department of Defense Information Network (JFHQ-DoDIN), spoke today at the Defense Systems Summit about how his relatively new component of U.S. Cyber Command is now tasked with operating and securing the entirety of DoD’s sprawling IT network infrastructure and has undertaken a complete restructuring of network operations for all of DoD. […]
Department of Justice Assistant Attorney General Stephen Boyd said Monday in a letter to Sen. Mark Warner, D-Va., that DoJ reached a premature conclusion in stating that stolen personal information used in a credit fraud case in Virginia was acquired from the 2015 Office of Personnel Management (OPM) data breach. […]
Even as Apple went public yesterday with a new mobile device operating system intended to close security loopholes that law enforcement agencies were using to access locked devices, one digital forensics firm said it found a workaround to bypass the new security features for a cost of about forty bucks. […]
Director of National Intelligence Dan Coats said Monday that the intelligence community (IC) will be prioritizing a comprehensive cyber posture, machine-augmented intelligence, and modern data management as “foundational priorities” in the coming years, following a year-long reexamination of the IC known as the IC2025 initiative. […]
Various arms of the Federal government are grappling with how to best curb critical infrastructure risk despite uncertainty regarding the best path forward and knowledge barriers surrounding the underlying technology. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
Keeping pace with growing cyber threats is an uphill battle for Federal agencies as network complexity increases and the boundaries of networks extend to systems and devices not always under the control of their IT organizations. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
A mobile device security platform funded in part by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been updated with a never-before-seen feature to help tackle one of the most persistent problems in Federal agency cybersecurity. […]
Amid growing fears of large-scale cyberattacks–ranging from attacks on infrastructure, to cyber espionage that threatens national security, to a “terabyte of death”–Congressional lawmakers are calling for a more clearly defined strategy for responding to such attacks. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
The National Defense Authorization Act (NDAA) for FY2019 will head into conference next week when legislators return from the Fourth of July recess. The $700+ billion must-pass defense spending bill has been approved in both the House and Senate, and now the two chambers must come together to reconcile differences in the legislation and re-vote the unified bill before it can land on President Trump’s desk for signing. […]
Leaders in the Federal intelligence community, speaking last Tuesday at Defense One’s Tech Summit, said that their agencies are using vast stores of data, machine learning, and neural networks to go beyond simple fact-finding, to now radically re-envision how the intelligence community acts on credible information. But with these advances in technology come thorny new ethical and procedural questions, those officials said. […]
With cybersecurity threats on the rise, most recently seen in a Chinese hack of a Navy contractor, the Department of Defense is taking new steps to ensure security, in part by putting more of the onus on contractors. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]
California lawmakers on Thursday passed the California Consumer Privacy Act of 2018, one of the toughest U.S. laws governing data privacy. The legislation specifically targets information companies, including Google, Facebook, Amazon, and AT&T–many of whom are headquartered in California. […]
The latest edition of the Army’s annual Cyber X-Games exercise is designed to let Reserve and other cyber warriors team up to train in dealing with real-world situations. It is focused on protecting U.S. infrastructure, an area somewhat outside the norm for the exercises, but one that reflects an emerging potential battleground on the cyber landscape. […]
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk. […]