On Tuesday, the Office of the Inspector General (OIG) released a semi-annual report of the National Security Agency (NSA) to Congress that cited several security concerns for the agency’s technology and data. […]

Ron Wyden Oregon

Sen. Ron Wyden, D-Ore., sent a letter on Friday to the Department of Homeland Security (DHS) calling on the department to block internet advertisements on Federal computers to prevent malware infections, citing advice from the National Security Agency (NSA). […]

DoD Pentagon Military

The Department of Defense’s Inspector General took the agency to task in a Nov. 8 report that says four DoD components failed to fully implement the 2015 Cybersecurity Information Sharing Act (CISA) which aims to encourage sharing of cybersecurity threat data between the government and the private sector. […]

election voting

The Department of Homeland Security on Aug. 13-15 hosted “Tabletop the Vote 2018: DHS’ National Election Cyber Exercise,” which invited vendors and Federal, state and local election officials to participate in election security preparation. […]

army fitness apps

The Pentagon is moving to protect its personnel from unintentionally advertising when they’re in an operational, and possibly secret, location. The new policy is a response to the revelation in January that a global heat map posted by fitness tracking company Strava could be used to identify the locations and activities of military personnel, even down to individuals, at military outposts around the world or in high-security areas such as the National Security Agency. […]

The National Security Agency published a news feature today that provides a new, NSA-developed resource for organizations looking to promote the well-being of their cybersecurity personnel. Dr. Celeste Lyn-Paul, senior researcher and technical advisor at NSA Research, and Dr. Josiah Dykstra, deputy technical director of NSA Cybersecurity Operations, developed the Cyber Operations Stress Survey (COSS) to help gauge stress levels of security personnel in high-risk environments. […]

The Federal government isn’t known for its progressive approach to IT infrastructure, and agencies aren’t usually early tech adopters. Yet, agencies are increasingly deploying cutting-edge DevOps methodologies to achieve agility and reduce operating costs. […]

Acronyms abound with a seemingly endless stream of Federal IT regulations and guidelines related to cloud and cyber security. Trying to make sense of the madness? On March 8, at “Cyber Convergence: Security, the Cloud and Your Data,” Federal visionaries will crack the code on some of the most critical developments in government’s IT agenda – from cloud-based application security to MGT, FITARA, and more. […]

The Army and Navy recently announced that their Cyber Mission Teams were fully operational, and the U.S. Cyber Command now has all of their planned complement of 133 teams in business. With its people (totaling more than 6,000 service members and civilians) in place, U.S. cyber forces can now look to machines to help carry out effective operations in the cyber domain. […]

The U.S. Cyber Command will begin to exercise its newly granted acquisition authority by the end of 2017 with its first industry day on Oct. 27. Congress gave CYBERCOM its own ability to purchase technology capabilities in order to keep up with the constantly changing nature of the cybersecurity sphere. CYBERCOM plans to hold its industry day at the Arthur Lundahl Conference Center in Springfield, Va. […]

Another cyberattack with links to the stolen cache of National Security Agency materials is spreading across Europe on June 27, targeting banks, businesses, and a Ukraine power company. Infections have been reported in Russia, Ukraine, Spain, France, the United Kingdom, and India. […]

The revelation that the National Security Agency conducted blanket surveillance of spectators at the 2002 Olympic Games could hurt the agency’s chances of getting its surveillance laws renewed this year. Thomas Drake, former NSA executive, submitted a formal declaration on May 25 that revealed the NSA’s program Stellar Wind, the goal of which was to “collect and store virtually all electronic communication going in or out” of the Salt Lake City area. […]

A group of prominent technology companies wrote a letter to the chairman of the House Judiciary Committee, asking Congress to reform the National Security Agency’s surveillance powers. The technology companies include Adobe, Amazon, Cisco, Google, and Microsoft. […]

A group of Delaware National Guard officers crowd around a computer as code flashes down the screen. One of them thinks he found a back door that will enable him to access the administrator credentials to the Naval Academy’s networks. Once they have the credentials, they can access the school’s “token,” a piece of classified information that the academy has been assigned to protect. […]

The hacker group, the Shadow Brokers released a password for alleged National Security Agency malware tools Saturday in protest of President Donald Trump’s policies. The Shadow Brokers first began selling NSA tools, which looked to be about three years old, in August, but nobody bought it for the requested $7,070,300 in bitcoin. Instead the Shadow […]

Harris received National Security Agency certification for its Harris Falcon III RF-300H wideband HF manpack radio system, which provides beyond-line-of-sight communications without a satellite for military personnel. […]

Weekend Reader

Categories