FireEye announced that it was able to identify a new Chinese hacker group, which they have labeled as Advanced Persistent Threat group 41 – or APT41. […]
The Army Futures Command (AFC) is currently developing new wearable identity authentication and authorization technologies, according to an Aug. 7 press release. […]
The National Institute of Standards and Technology (NIST) released a plan on Aug. 10 to prioritize Federal agency engagement in developing standards for artificial intelligence (AI), just before the deadline of an executive order issued in February that gave the agency 180 days to develop a plan. […]
U.S. Customs and Border Protection (CBP) is seeking to both expand facial recognition capabilities in its vetting of international travelers and migrate its traveler-processing technology to the cloud, according to an Aug. 8 CBP solicitation. […]
While the Continuous Diagnostics and Mitigation (CDM) program is here to stay for Federal agencies, taking proper approaches to data classification, collection, and analysis are key components to optimizing the program’s aims, security experts said last week at MeriTalk’s Cyber Security Brainstorm event. […]
In a letter on Aug. 7, Sen. Ron Wyden, D-Ore., wrote to telecom giants AT&T, T-Mobile, Sprint, and Verizon and urged them to store less sensitive customer data. […]
The Department of Homeland Security (DHS) is putting together a single contract vehicle that will award multiple vendors to manage DHS’ 17 unclassified security operations centers (SOCs). […]
As agencies move to the cloud and secure their data there, meeting the new challenges with innovative solutions is a great opportunity – as long as agencies abide by existing security baselines, said Federal IT leaders during MeriTalk’s Cybersecurity Brainstorm. […]
John Felker, who last month was named assistant director of the Cybersecurity and Infrastructure Security Agency’s (CISA) Integrated Operations Division (IOD), on Thursday discussed IOD’s plans to integrate operations of CISA’s three primary component organizations in order to produce better cyber threat data intelligence that will include inputs from Continuous Diagnostics and Mitigation (CDM) programs implemented by Federal agencies. […]
FBI Cyber Readiness, Outreach, and Intelligence Branch Deputy Assistant Director Tonya Ugoretz stressed at today’s MeriTalk Cyber Security Brainstorm that robust and resilient Federal cybersecurity requires collaboration across agencies and non-government partners. […]
The Federal Acquisition Regulation will ban agencies from procuring equipment from five Chinese companies, including Huawei and ZTE, starting August 13, according to an interim rule published August 7. […]
The Congressional Budget Office (CBO) released its estimate for S. 406, the Federal Rotational Cyber Workforce Program Act of 2019, and found that it would cost less than $500,000 annually to implement. […]
After only two years since the U.S. Air Force’s (USAF) launched Kessel Run, its Branch Chief Erynn Petersen touted the success they have seen in providing USAF with agile and resilient cybersecurity responsiveness at MeriTalk’s Cyber Security Brainstorm today. Petersen also stressed how Kessel Run can pose as a model for other cybersecurity teams. […]
The Senate last week confirmed Thomas McCaffery as Assistant Secretary of Defense for health affairs. […]
Sens. Marco Rubio, R-Fla., Tom Cotton, R-Texas, and Josh Hawley, R-Mo., wrote to Google CEO Sundar Pichai on Aug. 7 questioning the tech giant’s ties to China. […]
The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on Aug. 6 urging the public to “watch out for possible malicious cyber activity seeking to capitalize on” the recent mass shootings in El Paso, Texas, and Dayton, Ohio. […]
Federal agency approaches to identity management don’t have a single approach across the government, but vary to significant degrees with agencies’ mission focus, said LaChelle LeVan, Acting Director for Federal Identity, Credential and Access Management (ICAM) Program Office at the General Services Administration (GSA). […]
The Department of Justice (DoJ) announced Aug. 6 that it has extradited Muhammad Fahd, who allegedly bribed AT&T workers to plant malware and illegally unlock cell phones. […]
Officials from the Defense Department (DoD) highlighted supply chain and workforce and culture issues as two significant problems the agency faces in maintaining strong cybersecurity, during a panel discussion at FCW’s Cybersecurity Summit. […]
FBI Director Chris Wray announced Aug. 5 that Robert Bone will be special agent in charge of the Counterintelligence and Cyber Division of the Los Angeles Field Office. […]
Senior Security Architect for the General Services Administration’s (GSA’s) Technology Transformation Services (TTS) and Centers of Excellence (CoE) Dan Jacobs wants agencies and industry alike to heed the lessons GSA has learned from experience and the Black Hat conference over the past 16 years when it comes to securely implementing cloud. […]
Federal officials spoke about the future role of the cloud in mobile device management (MDM) and security at the ATARC Federal Mobile Technology Summit today. […]
The Federal government is looking forward to implementing 5G wireless services as they become available, but building security into 5G services from the beginning will be key to a successful implementation, said officials from the Department of Defense (DoD), the Cybersecurity and Infrastructure Security Agency (CISA), and the General Services Administration (GSA). […]
Distributed denial of service (DDOS) attacks rose by 39 percent between the first half of 2018 and June of this year, Netscout Systems said in a new threat intelligence report. […]
The Cloud Security Alliance (CSA) released its Top Threats to Cloud Computing Report today. The report, which was created after surveying 241 cloud industry experts, highlights the top 11 threats facing cloud computing. The report noted that cloud security issues are “often the result of the shared, on-demand nature of cloud computing.” […]
An August 5 alert issued by Microsoft’s Security Response Center is blowing the whistle on hacking efforts focused on three classes of internet of things (IoT) devices that Microsoft asserts are being attacked by the hacking group it identifies as “Strontium,” better known as the Russia-based cyber espionage group Fancy Bear. […]
The U.S. Food and Drug Administration (FDA) is seeking assistance to identify vendors that can provide simulations with virtually implanted generic medical devices using a whole-heart computational model. […]
The National Institute of Standards and Technology (NIST) wrote to Sen. Ron Wyden, D-Ore., on July 22 sharing details about its forthcoming guidance on how to securely share .zip files. […]
Sens. Cory Gardner, R-Colo., and Kyrsten Sinema, D-Ariz., introduced the TOWER Infrastructure Deployment Act (TOWER Act) with the goal of increasing broadband deployment across the country and addressing the workforce shortage within telecommunications industry. […]
While the Department of Veterans Affairs (VA) has completed its migration of existing records into the data center of its electronic health record (EHR) vendor, the VA and Department of Defense (DoD) are jointly searching for a director and deputy to oversee $10 billion, 10-year modernization effort. […]