The National Security Agency (NSA) and the Trusted Computing Group (TCG) industry consortium have come up with validation software that can be used with any device and could go a long way to securing the supply chain for computing devices.






[…]

National Security Agency (NSA) Senior Adviser Rob Joyce said yesterday that any move to regulate social media platforms would have to start with quicker and more efficient connections between policy makers and policy enforcers such as the Department of Homeland Security (DHS) and the Federal Bureau of Investigation, but also warned that any effective regulation of social media platforms would be difficult to achieve in the U.S.






[…]

quantum computing chip ai -min

Officials from the intelligence community on Thursday discussed the importance of using artificial intelligence to process and analyze the large amount of collected data by agencies, thus freeing analysts to shift their efforts toward looking into anomalies identified by AI.






[…]

On Tuesday, the Office of the Inspector General (OIG) released a semi-annual report of the National Security Agency (NSA) to Congress that cited several security concerns for the agency’s technology and data.






[…]

Ron Wyden Oregon

Sen. Ron Wyden, D-Ore., sent a letter on Friday to the Department of Homeland Security (DHS) calling on the department to block internet advertisements on Federal computers to prevent malware infections, citing advice from the National Security Agency (NSA).






[…]

DoD Pentagon Military

The Department of Defense’s Inspector General took the agency to task in a Nov. 8 report that says four DoD components failed to fully implement the 2015 Cybersecurity Information Sharing Act (CISA) which aims to encourage sharing of cybersecurity threat data between the government and the private sector.






[…]

election voting

The Department of Homeland Security on Aug. 13-15 hosted “Tabletop the Vote 2018: DHS’ National Election Cyber Exercise,” which invited vendors and Federal, state and local election officials to participate in election security preparation.






[…]

army fitness apps

The Pentagon is moving to protect its personnel from unintentionally advertising when they’re in an operational, and possibly secret, location. The new policy is a response to the revelation in January that a global heat map posted by fitness tracking company Strava could be used to identify the locations and activities of military personnel, even down to individuals, at military outposts around the world or in high-security areas such as the National Security Agency.






[…]

The National Security Agency published a news feature today that provides a new, NSA-developed resource for organizations looking to promote the well-being of their cybersecurity personnel. Dr. Celeste Lyn-Paul, senior researcher and technical advisor at NSA Research, and Dr. Josiah Dykstra, deputy technical director of NSA Cybersecurity Operations, developed the Cyber Operations Stress Survey (COSS) to help gauge stress levels of security personnel in high-risk environments.






[…]

The Federal government isn’t known for its progressive approach to IT infrastructure, and agencies aren’t usually early tech adopters. Yet, agencies are increasingly deploying cutting-edge DevOps methodologies to achieve agility and reduce operating costs.






[…]

Acronyms abound with a seemingly endless stream of Federal IT regulations and guidelines related to cloud and cyber security. Trying to make sense of the madness? On March 8, at “Cyber Convergence: Security, the Cloud and Your Data,” Federal visionaries will crack the code on some of the most critical developments in government’s IT agenda – from cloud-based application security to MGT, FITARA, and more.






[…]

The Army and Navy recently announced that their Cyber Mission Teams were fully operational, and the U.S. Cyber Command now has all of their planned complement of 133 teams in business. With its people (totaling more than 6,000 service members and civilians) in place, U.S. cyber forces can now look to machines to help carry out effective operations in the cyber domain.






[…]

The U.S. Cyber Command will begin to exercise its newly granted acquisition authority by the end of 2017 with its first industry day on Oct. 27. Congress gave CYBERCOM its own ability to purchase technology capabilities in order to keep up with the constantly changing nature of the cybersecurity sphere. CYBERCOM plans to hold its industry day at the Arthur Lundahl Conference Center in Springfield, Va.






[…]

Categories