The Air Force wants to take the idea of a virtual assistant to the next level, with a system that not only draws from existing information to answer questions, but puts some additional thought into helping airmen make better decisions. This is accomplished by quizzing them about what, precisely, they plan to do. […]
The Trump Administration’s proposed $4.4 trillion budget for FY2019 would add some money to the cybersecurity pot, supporting ongoing programs and manpower levels, while cutting back on cybersecurity research and redistributing where the research money goes. Administration budget requests are largely political documents whose numbers won’t hold up once Congress gets done with making the sausage, but they do reflect White House priorities. […]
Agencies undergoing digital transformation are combining on-premise, hybrid, and multiple cloud solutions into their environments. To that end, agencies need to weave cloud security and protection of on-premise systems into their broader security strategy for a true, defense-in-depth approach. […]
The Pentagon and White House are chewing over what to do about fitness tracking apps, in wake of the news last week that a global heat map posted online by Strava could be used to identify the whereabouts and activities of military personnel, including those in conflict zones and other sensitive areas such as the halls of the National Security Agency. A heat map transforms data into a map in which values are represented by colors, which in this case includes the location of fitness trackers carried by government employees. […]
As we barrel into Valentine’s Day, seems industry is falling in love again with NIST’s cyber framework makeover. Business groups and the tech sector reacted favorably to the latest update to the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure, but noted more work needs to be done in several key areas. […]
MeriTalk has confirmed ringside rumors that Jeff Eisensmith is looking to hang up his gloves at DHS. After more than five years going toe-to-toe with America’s cyber adversaries, we’d like to wish America’s leading CISO the very best as he punches out. […]
The FBI fell far short of its own goals for fighting cybercrime in 2017, according to a Department of Justice (DOJ) audit. The FBI reported disrupting or dismantling 262 high-level criminal operations targeting global U.S. interests, only about half of its goal of 500, and roughly one-tenth of the 2,492 cybercrime operations it broke up in 2014. […]
The Department of Defense (DoD) would like to get rid of the Common Access Card (CAC), but the problem–finding a suitable replacement. It turns out that the replacement won’t be one thing, but multiple biometric identifiers that combine to make out a person’s identity. […]
The idea of a scorecard seems like a quaint notion, conjuring black and white photos of somebody’s grandad in a fedora, licking the pencil tip before recording the latest play at the old ballgame in his program. […]
The Army’s work on the Internet of Battlefield Things (IoBT) is more than just a way to carve out a catchy name for the proliferation of smartphones, tablets, wearable devices, cameras and embedded devices that take the field with military forces. It also underscores the most important element of having those connected devices–the data collection and automated analytics capabilities required to make good use of the information they provide. […]
House Cybersecurity and Infrastructure Protection Subcommittee chairman Rep. John Ratcliffe, R-Texas, put the Continuous Diagnostics and Mitigation (CDM) program under the microscope in a hearing with industry experts last week. […]
Thousands of Federal contractors could find themselves scrambling to comply with stringent cybersecurity requirements after the General Services Administration (GSA) announced it is tightening the rules for protecting sensitive, non-classified data. […]
The Department of Defense (DoD) says it’s getting ready for the big one, but in this case, it’s not talking about a kinetic attack measured in megatons. It’s referring to a cyberattack measured in terabits. […]
Russian hackers might get all the attention these days, but the Department of Defense (DoD) hasn’t forgotten about WikiLeaks and Edward Snowden. […]
The Federal government wants to speed up adoption of cloud email and collaboration systems. But first it needs an accurate measure of how many agencies have not yet migrated to cloud email. There is definitive data on the benefits of cloud-based email solutions among CFO Act agencies, but no clear data regarding the adoption of cloud-based solutions at small and independent agencies, according to the Report to the President on Federal IT Modernization. […]
A bipartisan bill introduced in the Senate just before the Christmas break aimed at protecting American elections from foreign cyberattacks has been getting generally positive reviews from security professionals. […]
The rising frequency and intensity of cyberattacks on information technology systems that support the government, military, businesses, and critical infrastructure has raised awareness among senior Federal agency managers that security controls cannot be bolted on to systems as an afterthought. Security must be a core part of the design of systems from the beginning, and considered throughout the development lifecycle. […]
In the domain of warfare known as cyberspace, the Air Force’s cyber warriors naturally play a lot of defense, but they do it with the help of cyber weapons designed to add an important layer to the protection of the service’s operations and data. One example is the Air Force Cyberspace Defense (ACD) weapon system, a custom-built, $543 million suite that automates monitoring and analysis of activity on the Air Force Network (AFNET). […]
In 2015, Defense Department (DoD) contractors that handle sensitive DoD information were given extra time to comply with new department cybersecurity regulations. That grace period now is up, and companies must meet these requirements in 2018. […]
The computing world has mobilized en masse in response to the revelation of Meltdown and Spectre, vulnerabilities in computer processors that could open most of the world’s PCs and mobile devices to “side-channel attacks” that could steal data. […]
Federal IT executives must move quickly to apply patches for the recently discovered Meltdown and Spectre security vulnerabilities, but should also be on the lookout for potential performance hits and unforeseen glitches associated with the bug fixes. […]
Last year brought a great deal of change to Washington, D.C., from a new administration moving into the White House to D.C. United building a new stadium. As 2018 starts up with seemingly limitless IT opportunities ahead, MeriTalk takes a look back on the top Federal IT stories from 2017. […]
After years on the backburner, electronic warfare (EW) is moving up the ranks as an integral part of the Pentagon’s military focus. The Army last month received approval to move ground-based EW efforts into the Terrestrial Layer Intelligence System, joining cyber, signals, and other intelligence as part of the Multi-Function Electronic Warfare (MFEW) structure. The service wants to include airborne EW later this year. […]
Usually agencies want to speak highly of their IT operating systems, so to hear Deputy Secretary of the United States Department of Agriculture (USDA) Steve Censky call the USDA operating model “splintered and out of date” on Dec. 14 was a bit of a shock. […]
Password manager company, Dashlane, has added a twist with its list of the “Worst Password Offenders” of 2017, naming high-profile people and organizations that fell into the bad-password trap. President Trump was deemed the worst offender, primarily because of simple passwords reportedly used by cabinet members and policy directors. Outside parties were also the culprits for the Department of Defense, specifically for its contractor, Booz Allen, as well as the Republican Party (stemming from a careless data analytics firm). Paul Manafort, for using “Bond007” as a password, and Sean Spicer, for apparently tweeting his passwords, also came in for scorn. […]
Email is a core network application for both the private sector the and government, and has become an essential business communication tool. Since email is nearly ubiquitous and often poorly secured, it also has become a vector for fraud and data theft. Phishing emails can compromise not only Federal networks and databases, but also trust in government communications. […]
The flood of surveys and reports detailing the shortage of qualified IT and cybersecurity professionals is unrelenting. Estimates put the shortfall at anywhere between 1.8 million to 3.5 million in the next five years. […]
Since blockchain first appeared in 2009 as the digital ledger for Bitcoin cryptocurrency transactions, it has steadily taken the online world by storm, in the process practically becoming a synonym for security. Even if a lot of people still don’t know what it is, they’re beginning to hear it more and more. IBM, for instance, has taken to mentioning “blockchain for security” in its TV ads. And in a sure sign of pending mainstream acceptance, a “Blockchain for Dummies” book is now available. […]
The National Institute of Standard and Technology (NIST) released the second draft of the proposed update to its Framework for Improving Critical Infrastructure Cybersecurity. The new draft aims to clarify, refine, and enhance the framework as well as “amplifying its value and making it easier to use,” NIST officials said. […]
As the Principal Deputy Director of National Intelligence, Sue Gordon has no shortage of cybersecurity data at her fingertips, but the key to cyber success is connecting the dots cross-government and in partnership with the private sector. […]