The Department of Defense is following the Federal push to move toward an enterprise structure by using Defense Enterprise Office Solution (DEOS), an effort by the Defense Information Systems Agency to acquire Software-as-a-Service at a DoD enterprise scale. DoD plans to move 4.5 million users to the cloud, using this approach. […]
Christopher Painter made the case for cyber diplomacy after stepping down as cyber coordinator for the State Department in July. Painter wrote a blog post saying that cyber issues continue to grow, which increases the need for global discussions on cybersecurity. Yet Politico reported that the State Department is considering getting rid of its cybersecurity department. […]
The Government Accountability Office evaluated the advantages and disadvantages of the National Security Agency and Cyber Command’s dual-hat leadership system and found that the system causes tension between the two agencies due to competing interests. […]
Through its series of summer camps and competitions, the Air Force Association’s CyberPatriot program is aiming to expand the cybersecurity workforce for both the public and private sector. “What they have learned is if they wait until someone is a college graduate, it’s too late, if they wait until they’re in college, it’s too late,” said CyberPatriot National Commissioner Bernie Skoch. […]
The best way for agencies to begin their transition to the cloud is to talk to agencies that have been through the same experience. “It’s always good to talk to people who have gone through it,” said Craig McCullough, vice president of Commvault Federal. […]
Incorporating automation into the U.S. electric grid can both improve recovery capabilities in the event of an outage and present new cybersecurity dangers, according to a recent National Academies of Sciences, Engineering, and Medicine report. […]
Cybersecurity considerations for both government and industry have to include leadership, supply chains, mobility, and other components in order to be effective, according to experts who spoke at PCM-G’s Mission First event. […]
Federal agencies that amass multitudes of data because of drone use have had to think about how to store and protect that data. Agencies that use drones are caught between following the regulations in place for aircraft and following the regulations for IT systems, since drones contain properties of both categories. […]
The House Homeland Security Committee on July 26 unanimously passed two bills to improve the government’s cybersecurity posture: the Cybersecurity and Infrastructure Security Agency Act of 2017 and the Cyber Vulnerability Disclosure Reporting Act. The Cybersecurity and Infrastructure Security Agency Act creates a new agency within the Department of Homeland Security (DHS) to deal with […]
Despite the relatively new nature of cyber insurance policies, small businesses are finding value in their offerings, according to witnesses who testified before the House Small Business Committee on July 26. “It affords me the knowledge that if we were hacked, protective steps have been taken to address any potential damages to the company and my employees,”said Robert Luft, president of SureFire Innovations. […]
The United States and Japan on July 24 held a joint cyber dialogue, where the countries spoke about information sharing and strengthening international cybersecurity. […]
Federal leaders emphasized the importance of cybersecurity and partnerships with the private sector at the Aspen Security Forum on July 22. Secretary of Homeland Security John Kelly said he agrees with the decision of former DHS Secretary Jeh Johnson that made election systems critical infrastructure and told the states that DHS would offer help if […]
IBM released its new mainframe, IBM z14, which offers encryption for 100 percent of user data and achieves the highest level of government security standards currently on the market. The mainframe will be made available in mid-September and IBM is working with the Federal government to integrate this technology into its IT strategies. […]
The Department of Justice announced on July 20 that it was recently able to take down dark website AlphaBay and its administrator. The action was in conjunction with Europol as well as law enforcement authorities in Thailand, the Netherlands, Lithuania, Canada, the United Kingdom, and France. […]
BlackBerry announced the expansion of its public sector cybersecurity offerings to include SecuSUITE for Government, which provides end-to-end encryption of calls and texts and supports iOS, Android, and BlackBerry 10 smartphones and tablets. […]
Cyber criminals are more and more often using tools and processes already installed in target computers, called “living off the land,” to ease hacking efforts and reduce the chance of detection, according to a recent Symantec study. […]
The White House is celebrating Made in America Week, while many U.S.-based technology companies advocate for H-1B visas to sponsor foreign workers who engineer some of the nation’s most lucrative technology products. […]
The State Department’s cyber coordinator will be stepping down at the end of this month, according to reports from Politico. Chris Painter has been creating a strategic framework for cybersecurity during peacetime and gaining support from other countries. […]
Members of Congress urged Defense Secretary James Mattis in a letter to incorporate cybersecurity into high school Junior Reserve Officers Training Corps (JROTC) programs. […]
While President Donald Trump talks about creating a Cybersecurity Unit with Russia, government officials told the Washington Post that Russian government hackers were behind recent cyber intrusions into the business systems of U.S. nuclear power and other energy companies. […]
In 2012, the Office of Management and Budget listed 14 cross-agency priority goals as part of the Government Performance and Results Modernization Act. One topic identified was continuous monitoring of Federal IT networks. The next year, the Department of Homeland Security (DHS) announced a $6 billion program to address this: the Continuous Diagnostics and Mitigation (CDM) program. […]
Many states and localities don’t have the resources to upgrade and protect their election systems from malicious cyber intrusion, and the Federal government should work to provide them with those resources, according to a recent Brennan Center report on election cybersecurity. […]
Kaspersky Lab is willing to turn over its source code to the U.S. government to dispel rumors that the company has ties to the Russian Kremlin, CEO Eugene Kaspersky told the Associated Press on July 1. “If the United States needs, we can disclose the source code,” Kaspersky said. “Anything I can do to prove that we don’t behave maliciously, I will do it.” […]
Reps. Anna Eshoo, D-Calif., and Susan Brooks, R-Ind., and Sens. Orrin Hatch, R-Utah, and Ed Markey, D-Mass., introduced legislation June 29 to combat cyber crime by mandating that the National Institute of Standards and Technology, the Federal Trade Commission, and the department of Homeland Security (DHS) establish baseline best practices for the private sector. […]
The cyberattack that spread across Europe on June 27 was declared not a ransomware attack after further observation by researchers. The “Not Petya” attack didn’t encrypt files on the infected computers. Instead, it wiped the entire drive, making it impossible to retrieve files if they weren’t backed up on another device. […]
The United States and Israel announced plans June 27 to cooperate on cybersecurity issues, including domestic and international cyber policy, critical infrastructure protection, research and development, and workforce development. […]
Barracuda Networks announced the release of Barracuda Sentinel, an artificial intelligence-based solution to the increasingly targeted spear phishing campaigns experienced by all sizes of government and industry. […]
Companies that paid the ransom to retrieve their data from the Petya ransomware attack have no way of receiving the encryption key. Although Symantec has verified the Ukrainian accounting service, MeDoc, as “patient zero” for the attack, the cybersecurity company hasn’t discovered who is behind the attack. The email account that the attack stemmed from has been shut down, so that companies that pay the ransom of $300 won’t receive the encryption key needed to return their data. […]
Another cyberattack with links to the stolen cache of National Security Agency materials is spreading across Europe on June 27, targeting banks, businesses, and a Ukraine power company. Infections have been reported in Russia, Ukraine, Spain, France, the United Kingdom, and India. […]
The number of reported Internet crimes and the costs incurred by those crimes are on the rise, according to the FBI Internet Crime Complaint Center’s recently released 2016 Internet Threat Report. The “hottest” Internet crimes of 2016 were business email compromise, ransomware, tech support fraud, and extortion. […]