Here is a map of the states. Well, at least 48 of the 50 states.

A new report from The Century Foundation, a progressive think-tank, urges state law enforcement officials to take action on data privacy regulations in the absence of any substantial movement in that direction by the Federal government. […]

election voting

The Department of Homeland Security on Aug. 13-15 hosted “Tabletop the Vote 2018: DHS’ National Election Cyber Exercise,” which invited vendors and Federal, state and local election officials to participate in election security preparation. […]

voting, election security

Cybersecurity solutions provider Cylance today announced that it is offering free artificial intelligence-based antivirus software “to support all 2018 U.S. political campaigns” in the wake of pervasive election security concerns across the Federal government. […]

Modernization, Army, cybersecurity, technology

The Army needs help from academia and the private sector to modernize its workflow, explained Maj. Gen. Garrett Yee, acting deputy CIO for the U.S. Army, during an Avaya webinar today. Yee specifically stressed an interest in industry helping to make the Army’s workflows interoperable and said that “workflows at the installation level must be scalable” to achieve true modernization. […]

Ajit Pai

In advance of his appearance before the Senate Commerce, Science, and Transportation Committee scheduled for tomorrow, four House Democrats hammered Federal Communications Commission Chairman Ajit Pai over statements he made in 2017 that the FCC was a victim of a distributed-denial-of-service (DDOS) attack which impacted its electronic comment filing system during the agency’s net neutrality rulemaking proceeding last year. […]

White House

The White House said President Trump has signed into law the NIST Small Business Cybersecurity Act, S. 770, which directs the National Institute of Standards and Technology (NIST) to provide resources to small businesses to help them implement NIST’s voluntary cybersecurity framework. […]

The idea that you can’t trust everything you see on the Internet is a conventional, if sporadically followed, wisdom. But as hackers become increasingly skilled and sneaky, as “fake news” officially enters the dictionary, and as fake video and fake audio become more of a thing, you might not necessarily be paranoid to wonder if you can trust anything. […]

China-based communications equipment maker Huawei Technologies said in a statement late Monday that the ban on Federal government use of the company’s products contained in the FY2019 National Defense Authorization Act (NDAA) signed by President Trump this week won’t do anything to improve supply chain security. […]

The National Security Agency published a news feature today that provides a new, NSA-developed resource for organizations looking to promote the well-being of their cybersecurity personnel. Dr. Celeste Lyn-Paul, senior researcher and technical advisor at NSA Research, and Dr. Josiah Dykstra, deputy technical director of NSA Cybersecurity Operations, developed the Cyber Operations Stress Survey (COSS) to help gauge stress levels of security personnel in high-risk environments. […]

Sen. Edward Markey, D-Mass., is pressing major electric utility companies for details about whether and when their systems have been penetrated by Russian-affiliated hackers, and at the same time is querying several Federal agencies about what they are doing to help utilities recognize and prevent attempts to break into their networks and control systems. […]

MITRE, a manager of Federally-funded research and development centers targeting Federal defense, intelligence, and cybersecurity functions, recommended in a new report released today that the Defense Department (DoD) undertake a sweeping menu of actions to improve military supply chain security, and warned that maintaining the status quo of current security policy may have ruinous consequences. […]

President Trump today signed into law the FY 2019 National Defense Authorization Act (NDAA), which clocks in at $717 billion in spending for the Pentagon. After months of negotiations, hearings, and compromises, the must-pass defense spending bill was signed during a visit by President Trump to Fort Drum in upstate New York this afternoon. […]

voting, election security

As Federal agencies adopt DevOps practices to shorten development cycles and increase deployment frequency, security must be interwoven into every aspect of the process from design, through coding, testing, release, and operation. […]

A former top White House cybersecurity policymaker and IT systems manager at the Department of Education said today at the FCW Cybersecurity Summit that Federal agencies should expect to become targets of sophisticated cyber attacks and should count on assistance from other entities including their cloud service providers to meet those assaults.  […]

The Small Business Administration’s (SBA) Deputy CIO Guy Cavallo and CTO Sanjay Gupta said today at the FCW Cybersecurity Summit that their agency’s unorthodox approach to the Continuous Diagnostics and Mitigation (CDM) Program is yielding a ton of practical benefits, even though it required a bit of a departure from CDM’s initial guidelines. Now, SBA is providing a new potential model for other agencies – many struggling with the first of CDM’s four phases – to use when considering how to achieve the outcomes the program intends. […]

A new survey from Tripwire, a security and compliance automation software provider, found that organizations need to go back to basics and make sure they are properly implementing and maintaining cybersecurity fundamentals. The survey, released today, found that organizations are not focusing on basic security controls that the Center for Internet Security (CIS) refers to as “cyber hygiene.” […]

The U.S. Cyber Command (Cybercom) and the National Security Agency have joined the effort to protect the integrity of this year’s midterm elections, which are occurring under the shadow of Russia’s meddling in the 2016 election and warnings from U.S. intelligence agencies that 2018 is seeing more of the same. […]

Federal CIO Suzette Kent said today at the FCW Cybersecurity Summit that continuous dialogue and attention on cybersecurity priorities are working to move the Federal government collectively in the right direction at a time when the need for unified effort is paramount. […]

threat

Officials in government, the private sector, and academia discussed their efforts to establish a defensive posture and use technology-augmented programs to deter and detect insider threats, at an event hosted by Nextgov and Equifax Tuesday. […]

The Pentagon is looking to get into the weeds with cyber defense, using artificial intelligence to hunt down attacks that may use the size and complexity of its systems to hide out while waiting to strike. […]

Categories