Rep. Will Hurd, R-Texas said Tuesday that after the Modernizing Government Technology Act (MGT) passes Congress, his next objective will be to work on the cybersecurity workforce in the Federal government, likely through a Cyber National Guard. […]
The IT professionals at the Department of Defense are learning to speak the language of the warfighter. […]
The cyber threat landscape has experienced a major shift toward politically motivated attacks, according to the Symantec 2017 Internet Security Threat Report. […]
After nearly five years of development, the Department of Homeland Security Science and Technology Directorate is making a malware detection technology commercially available. Hyperion, a malware forensics and software assurance technology, will transition to the marketplace through S&T’s Transition to Practice program. […]
The State Department announced that the United States and Argentina will establish an intergovernmental, bilateral Cyber Policy Working Group. […]
Technology developers and government agencies know how to incorporate cybersecurity into their products, but the question is whether they have the will to do it, according to National Institute of Standards and Technology fellow Ron Ross. […]
The fact that state actors are forced to use criminal, mercenary hackers in their cyber espionage and attack campaigns is a silver lining to law enforcement looking to identify and catch the perpetrators, according to Adam Hickey, deputy assistant attorney general for national asset protection at the Department of Justice. […]
The Federal Communications Commission asked for nominations for its Communications Security, Reliability, and Interoperability Council, which will discuss the reliability of communications systems and infrastructure, Internet protocol-based 911 systems, emergency alerting systems, and national security and emergency preparedness communications systems. […]
President Donald Trump’s cybersecurity executive order will be announced in the near future, and will focus on the administration’s cybersecurity priorities of innovation, protecting critical infrastructure, and addressing international cyber norms, according to Robert Joyce, special assistant to the president and cybersecurity coordinator at the White House. […]
Rep. Daniel Webster, R-Fla., introduced the NIST Small Business Cybersecurity Act, which directs the National Institute of Standards and Technology director to disseminate guidelines, tools, best practices, standards, and methodologies for small businesses to improve their cybersecurity. […]
A group of 29 organizations led by digital rights group Access Now on Wednesday announced the formation of the Fly Don’t Spy campaign, which opposes “extreme vetting” tactics requiring travelers to provide social media passwords in exchange for entry. […]
As the prospect of a cybersecurity executive order looms, industry groups clamor to get an audience with President Donald Trump and his advisers to influence the administration’s technology policy. (ISC)², a nonprofit that specializes in information security education and certifications, presented its ideas to White House Chief of Staff Reince Priebus and others on Trump’s team. […]
The foreign ministers of the G7 nations expressed increased concern about cyber interference in elections. Leading up to the G7 Summit in Italy in May, they also adopted the G7 Declaration on Responsible States Behavior in Cyberspace. […]
Secretary of Homeland Security John Kelly has not seen the most recent draft of President Donald Trump’s executive order on cybersecurity, even though retired Gen. Michael Hayden, former director of the National Security Agency and CIA, stated last week that it had been written. […]
As the U.S. military shifts its focus to Europe and Asia, the cyber dominance the Army enjoyed in Afghanistan and Iraq may no longer be assured, according to a recently released Army field manual. […]
Federal agencies must identify and code vacant civilian positions with information technology and cybersecurity functions by April 18 to ease the hiring process of new cybersecurity professionals. The Office of Personnel Management will check in with agencies in May to confirm that coding procedures are established and in place. […]
Malicious insiders often don’t get caught because of stovepiped security monitoring systems, according to Lou Bladel, a former FBI agent who led the Edward Snowden and David Petraeus investigations in his time there. […]
Microsoft announced that it had already patched the vulnerabilities that were disclosed by the Shadow Brokers hacker group last week. […]
The average hacker spends eight months in a network before getting caught, according to Jason Hess, chief of cloud security at the National Geospatial-Intelligence Agency. In order to keep pace with cyber warriors—and the technology they use—NGA is taking on developers at a faster rate and keeping them for short periods of time rather than long terms of work. […]
When it comes to cybersecurity, agencies tend to focus too much on defending the perimeter and not enough on protecting assets within the network, according to industry and former government experts. […]
The National Geospatial-Intelligence Agency needs to attract new tech talent with new ideas and a desire to work on something bigger and more important than the next popular dating app. One of the ways the agency hopes to do that is by continuing to work with the government’s own in-house innovation shop, 18F. […]
Defending against U.S. intelligence leaks such as those committed by Edward Snowden and Julian Assange’s Wikileaks requires a “fundamental change” in the way that intelligence deals with digital attacks and vulnerabilities, according to CIA Director Mike Pompeo. […]
As the State Department works to gain international support for its cybersecurity framework, experts said that global norms and deterrence won’t be enough to convince state actors not to influence elections through cyber means in the future. […]
President Trump’s Homeland Security Advisor Tom Bossert has drafted a new cybersecurity executive order, which will direct certain agencies to provide reports on their cybersecurity within a set number of days, according to retired Gen. Michael Hayden, who has served as the director of both the National Security Agency (NSA) and the CIA. […]
In the age of machine learning, there’s a fine line between collecting enough employee data for insider threat programs and ensuring personal privacy, a line that Americans may have to culturally define in the near future, according to experts speaking at an Intelligence and National Security Alliance (INSA) event on Monday. “Are we willing to […]
The hacker group, the Shadow Brokers released a password for alleged National Security Agency malware tools Saturday in protest of President Donald Trump’s policies. The Shadow Brokers first began selling NSA tools, which looked to be about three years old, in August, but nobody bought it for the requested $7,070,300 in bitcoin. Instead the Shadow […]
Government increasingly supports missions calling for 24/7 connectivity to enterprise applications from mobile devices that exposes federal data to a new, broader spectrum of risk from cyber attacks, malware, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Federal cyber leaders are working to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. […]
Thirteen senators including Cory Gardner, R-Colo., and Brian Schatz, D-Hawaii, sent a letter to President Donald Trump on Wednesday requesting that he address issues of Chinese behavior in cyberspace during his meeting today with Chinese President Xi Jinping. […]
The government needs to create and fund new hiring programs to fill Federal cyber vacancies, according to experts testifying before the House IT Subcommittee on Tuesday. […]
Classified information and high-level security clearances can impede information-sharing when it comes to cyber threats, witnesses testified at a U.S. Senate Committee on Energy and Natural Resources hearing. […]