Agencies undergoing digital transformation are combining on-premise, hybrid, and multiple cloud solutions into their environments. To that end, agencies need to weave cloud security and protection of on-premise systems into their broader security strategy for a true, defense-in-depth approach. […]

The Pentagon and White House are chewing over what to do about fitness tracking apps, in wake of the news last week that a global heat map posted online by Strava could be used to identify the whereabouts and activities of military personnel, including those in conflict zones and other sensitive areas such as the halls of the National Security Agency. A heat map transforms data into a map in which values are represented by colors, which in this case includes the location of fitness trackers carried by government employees.






[…]

As we barrel into Valentine’s Day, seems industry is falling in love again with NIST’s cyber framework makeover. Business groups and the tech sector reacted favorably to the latest update to the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure, but noted more work needs to be done in several key areas.






[…]

The FBI fell far short of its own goals for fighting cybercrime in 2017, according to a Department of Justice (DOJ) audit. The FBI reported disrupting or dismantling 262 high-level criminal operations targeting global U.S. interests, only about half of its goal of 500, and roughly one-tenth of the 2,492 cybercrime operations it broke up in 2014.






[…]

The Department of Defense (DoD) would like to get rid of the Common Access Card (CAC), but the problem–finding a suitable replacement. It turns out that the replacement won’t be one thing, but multiple biometric identifiers that combine to make out a person’s identity.






[…]

The idea of a scorecard seems like a quaint notion, conjuring black and white photos of somebody’s grandad in a fedora, licking the pencil tip before recording the latest play at the old ballgame in his program.






[…]

The Army’s work on the Internet of Battlefield Things (IoBT) is more than just a way to carve out a catchy name for the proliferation of smartphones, tablets, wearable devices, cameras and embedded devices that take the field with military forces. It also underscores the most important element of having those connected devices–the data collection and automated analytics capabilities required to make good use of the information they provide.






[…]

House Cybersecurity and Infrastructure Protection Subcommittee chairman Rep. John Ratcliffe, R-Texas, put the Continuous Diagnostics and Mitigation (CDM) program under the microscope in a hearing with industry experts last week.






[…]

1 2 3 58