Rob Joyce
Joe Biden
Cybersecurity
CISA

Josh Corman, the former chief security officer at PTC who joined the Cybersecurity and Infrastructure Security Agency in July as a Visiting Researcher to support the agency’s COVID-19 response effort, warned on Sept. 16 that any significant delay in distributing coronavirus vaccines – by malicious hackers or otherwise – could endanger the lives of millions of people. […]

Software Development Operations, or DevOps, can go by many names. DevSecOps, inserts Security into the equation while DevSecEthOps throws ethics into the mix, but ultimately the goal of the process is to build secure software – fast. […]

While the commander of U.S. Cyber Command emphasized action in protecting the elections on July 20, so too did a group of over 30 former government officials in a letter to House and Senate leadership. […]

Cyber Attack

The National Security Agency (NSA) updated its telework tech security guidance June 4 with new details for government agencies to consider when selecting which collaboration and video chat services to use to connect employees working remotely. […]

The National Security Agency (NSA) released a guide on April 24 to help Federal agencies make decisions about which collaboration and video chat services to use during telework, as the government continues to adjust to mass telework orders. […]

The former chief security officer at Facebook urged in a column published today on the “Lawfare” blog that the U.S. consider creating an independent, “defense-only” cybersecurity agency to deal with defense of election systems and processes that may come under attack by adversaries. […]

NSA

The National Security Agency’s (NSA) Office of Inspector General (OIG) has for the first time released its semi-annual report to Congress as an unclassified document, and in the process shed light on IT deficiencies at the agency. The report, released Wednesday and covering the period of October 1, 2017 to March 31, 2018, highlights multiple audits that found numerous issues in the governance of NSA’s IT infrastructure and its subsequent ability to mitigate cybersecurity risk. […]

The U.S. Cyber Command is ready for its close-up. The command announced May 17 that all 133 of its Cyber Mission Teams are fully operational, capping a roughly one-month stretch that saw the arrival of a new commander, the opening of a new operations center, and the official designation of Cybercom as a full unified combatant command. […]

A lot of the Army’s most high-profile modernization projects concern complex, expensive weapons systems that emerge from research and development, budgeting, and procurement process inside the halls of the Pentagon and other facilities and outside of the experience of most people. But some key elements of the Army’s efforts to keep pace with the demands of a changing world are so familiar to people at home, at work, or in a coffee shop that they take them for granted. An example of this is good, reliable Wi-Fi. […]

As the deadline to renew the National Security Agency’s surveillance powers looms, proposed bills and speculations of bills drive the conversation on national security versus privacy. Senate Republicans led by Sen. Tom Cotton, R-Ark., proposed a bill in June to completely renew Section 702 of the Foreign Intelligence Surveillance Act without any changes or sunset provision. Section 702, which expires at the end of the year, allows the NSA to collect data from foreign nationals without obtaining a warrant. […]

The National Security Agency gave Columbus State University in Georgia a $174,000 grant to develop a cybersecurity training tool. “We are building a tool that people across the nation can use to develop cybersecurity training, which guarantees compliance with government and industry standards for cybersecurity workforce development,” said Shuangbao “Paul” Wang, a professor in CSU’s TSYS School of Computer Science. […]

The Government Accountability Office evaluated the advantages and disadvantages of the National Security Agency and Cyber Command’s dual-hat leadership system and found that the system causes tension between the two agencies due to competing interests. […]

No Category Set!

James Dempsey, a former member of the Privacy and Civil Liberties Oversight Board, wrote a letter last week proposing that President Donald Trump appoint a full board if Congress chooses to renew the National Security Agency’s surveillance law. […]

NSA

Adm. Michael Rogers, head of the National Security Agency and U.S. Cyber Command, said that the section of the Foreign Intelligence Surveillance Act that allows the NSA to collect information on foreign nationals is “instrumental” in providing Congress with intelligence. […]

Thousands of students from hundreds of universities have approximately 103 days, 10 hours, and 27 minutes to help the National Security Agency disarm a remote-controlled improvised explosive device for this year’s Codebreaker Challenge. […]

Categories