NASA

According to a new report by NASA’s Office of Inspector General (OIG), NASA is not adequately securing its networks from unauthorized access by IT devices, and has not fully implemented controls to remove or block unauthorized IT devices from accessing the agency’s networks and systems. […]

Software Development Operations, or DevOps, can go by many names. DevSecOps, inserts Security into the equation while DevSecEthOps throws ethics into the mix, but ultimately the goal of the process is to build secure software – fast. […]

Cloud Computing Brainstorm 2019 - Sean Connelly
CISA

With artificial intelligence applications still being developed, the chief technology officer of the nation’s primary cyber agency said “a new cadre of data professionals” is needed in order to prepare cyber information for analysis. […]

John Felker, a 30-year Coast Guard veteran and a vital force in building mission capabilities of the Cybersecurity and Infrastructure Security Agency over the past several years, said he plans to retire from government service on Sept. 25. […]

CISA
DHS

At the Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA) offices responsible for managing emergency communications, the coronavirus pandemic has required officials to adapt natural disaster plans to the unique challenges of the public health crisis, government officials said today.   […]

Health and Human Services HHS
IRS

The Treasury Inspector General for Tax Administration (TIGTA) told the Internal Revenue Service (IRS) that it needs to do a better job to verify wireless device identity, although it said that based on audit results IRS was employing effective strategies and protocols to authenticate network user identities. […]

A Government Accountability Office (GAO) report found that the Federal Aviation Administration (FAA), Indian Health Service, and Small Business Administration (SBA) are using security tools given to them by the Department of Homeland Security (DHS) as they’re intended: to identify hardware and software on their networks that may have vulnerabilities and insecure configurations. But GAO said the agencies have more to do manage their network in order to optimize the value of the tools. […]

The Navy’s Fleet Cyber Command/TENTH Fleet – a force of 55 commands and 40 Cyber Mission Force units across the globe – has unveiled its long-range strategic goals for the “21st century’s Information Age.” […]

Pentagon Military Defense DoD

Ellen Lord, the Defense Department’s (DoD) undersecretary of Defense for Acquisition and Sustainment, provided updates on August 13 on pathfinder projects and database construction for DoD’s Cybersecurity Maturity Model Certification (CMMC) program that aims to strengthen cybersecurity throughout the U.S. defense industrial base (DIB). […]

CISA
Cybersecurity
NIST

The National Institute of Standards and Technology (NIST) launched the final version of Special Publication (SP) 800-207 Zero Trust Architecture on August 11. […]

Veterans Affairs
FITARA

Officials with several leading Federal IT service providers applauded government agency grades on last week’s FITARA Scorecard, but also suggested a range of grading category adjustments for the scorecard to better track where agency performance should be going in the future. […]

State Department

Amb. Robert Strayer, the Department of State’s point person for cyber and international communications policy, is leaving government to join the Information Technology Industry (ITI) Council, a global technology trade association. […]

State Department
DHS

As government cybersecurity practices shifted to adjust to the increase in telework during the COVID-19 pandemic, officials from the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) previewed cyber tools offered by the agencies, but reminded Feds that knowing the network architecture is an early and necessary step toward selecting the correct protections. […]

CISA

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency released a new online tool designed to help individuals navigate career options in the field of cybersecurity. […]

electric grid

When it comes to the security of sensitive information in the energy sector, collaboration between the Department of Energy, intelligence community, and private sector are foundational to these efforts, Senior Advisor at the Office of Policy for Cybersecurity, Energy Security, & Emergency Response Alexander Gates said. […]

The national security community of the United States has found itself in a conundrum in the last few years, warning other countries about the risks of the China-based company Huawei, but unable to provide an American alternative for 5G networks. […]

congressional vote voting election senate-min

This week the Federal agency primarily responsible for protecting elections held a training event to test its plans in advance of November’s Election Day. The third “Tabletop the Vote” exercise hosted by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, took place over a three day period from July 28 to 30, featuring 37 states and over 2,000 total participants, the majority of which participated remotely. […]

European union EU-min

Rep. Jim Langevin, D-R.I., chairman of the House Armed Services Committee’s Subcommittee on Intelligence and Emerging Threats and Capabilities, voiced support at a July 30 subcommittee hearing for the European Union’s placement of sanctions on Russian, Chinese, and North Korean entities for their role in high-profile cyber attacks. […]

While telecommunications providers in the United States prepare to rip out and replace gear from China-based Huawei and the United Kingdom has moved to eventually ban the company’s equipment from its 5G networks, the German government has officially stated its neutrality in the matter. […]

CISA

The Cybersecurity and Infrastructure Security Agency (CISA) announced July 28 the second annual President’s Cup Cybersecurity Competition. Registration is open to any Federal Executive branch employee, including Department of Defense (DoD) and uniformed service members, with a knack for cybersecurity. Individuals can either register solo or as part of a team. […]

Categories