(Image: Shutterstock)

The investigation into the August hack of the National Security Agency’s cybersecurity tools is looking into a theory that a former NSA employee left the information on a remote server that the Russian hackers found, according to Reuters. […]

(Photo: Shutterstock)

The Department of Veterans Affairs announced that the Department of Homeland Security and Hiring our Heroes have teamed up to offer free online, on-demand cybersecurity training to government employees and veterans via DHS’ Federal Virtual Training Environment.






[…]

(Illustration: Shutterstock)
NSA
cybertroop
Rogers-PaloAlto

The National Security Agency is working on possibly developing software to respond to digital acts of war, NSA Director Adm. Michael S. Rogers said this week at MeriTalk’s Federal Forum in Washington, D.C. That software could help the United States respond to cyber incidents to turn the situation in its favor.






[…]

Print

Privacy advocates launched a new website Monday called end702.com that urges Congress to allow a controversial section of the Foreign Intelligence Surveillance Act (FISA) to expire at the end of next year. Fight for the Future and a coalition of public interest groups are encouraging Congress to let Section 702 of the FISA Amendments Act of […] […]

surveillance

There seems to be no middle ground in the Internet surveillance versus privacy dispute. The two sides found little to agree on at a debate hosted by the Hudson Institute. David Rivkin, a constitutional law attorney, said government surveillance “has to be indiscriminate. … We have to surveil more.”






[…]

identity

It has become so tough for Federal agencies to find skilled technical talent that the National Security Agency is collecting resumes from “former civilian affiliates” who have the necessary skills, experience, and security clearance to help the agency “augment the existing work force on high priority projects or programs.” … A pilot program is underway to demonstrate the use of federated online identity technologies for use by hospitals and patients. … And DOD continues to make significant progress on its insider threat detection program and the intelligence community’s new continuous evaluation effort.






[…]

cyberattack

Cyber Command’s influence may not be as expansive as some think, according to its commander, Adm. Michael Rogers. “The Department of Defense is not resourced, nor is it tasked with defending every single computer structure in the U.S.,” he said.






[…]