Policy

Effort to Develop Open Standards for 5G Moves in Intelligence Authorization Act

The bill cleared committee with one conspicuous hold out over an unsustainable proliferation of government secrets.

Cybersecurity

Federal Officials: Tackling the ‘Most Insidious’ Cyber Threat Takes Looking After Workers 

Insider threat is seen as the primary attack vector for intellectual property theft and was reportedly on the rise last year.

Cybersecurity

Congressman floats 'FITARA-like' scorecard to measure security clearance process

A significant reduction in the backlog of security clearance investigations over the past two years has contractors feeling more optimistic, but concerns about lengthy adjudications and reciprocity between federal agencies still linger.

Cybersecurity

TIC 3.0 and zero-trust networking

Commentators on the new Trusted Internet Connection policy have noted that "zero-trust" strategies might not be a perfect fit.

Cybersecurity

TSA to roll out strategic plan for insider threats next month

Acting Deputy TSA Administrator Patricia Cogswell said that as screening tech has improved, insider threats have become an increasingly attractive attack vector for bad actors.

Cybersecurity

CISA touts CDM, CyberStat as key cyber compliance tools

A watchdog report found DHS doesn't always validate whether agencies are complying with mandatory directives. The department floated plans to leverage two existing program to do just that.

Cybersecurity

IC merging suitability and clearance reviews

The Office of the Director of National Intelligence says the move will strengthen human resources officers' role in hiring for nation's most sensitive positions.

Modernization

AWS lawsuit alleges 'improper pressure' from Trump on JEDI

President Donald Trump personally steered a $10-billion cloud computing contract away from frontrunner Amazon Web Services out of personal and political animus against Amazon founder Jeff Bezos, according to the details of a lawsuit released publicly Dec. 9.

Cybersecurity

Navy CIO talks innovation, cybersecurity and CMMC

Navy CIO Aaron Weis said DOD's upcoming unified cyber standard will help close the innovation gap by adopting industry standards, but ultimately the onus is on the Defense Department to set the tempo.

Cybersecurity

Industry seeks more liability protections for threat info

Commercial providers of technology and infrastructure want more federal protection to share specific cyber threat information about risky products and services.

Cybersecurity

Background checks move to DOD

The government’s background investigations agency with some 3,000 employees has moved from the Office of Personnel Management to the Defense Counterintelligence and Security Agency.

Cybersecurity

Justice Department Charges Edward Snowden With Violating Non-Disclosure Agreements

Prosecutors are seeking to prevent the former NSA contractor from profiting from his unauthorized release of classified information.

Ideas

Happy Insider Threat Awareness Month!

Insider threats are potentially far more dangerous than those attacking from outside.

Acquisition

DOD releases unified cybersecurity standard for contractors

The Defense Department's Cybersecurity Maturity Model Certification framework is ready for public comment.

Digital Government

China’s Spies Are on the Offensive

China’s spies are waging an intensifying espionage offensive against the United States. Does America have what it takes to stop them?

Cybersecurity

CISA official touts data sharing in critical infrastructure

Where privately owned critical infrastructure providers had balked at sharing threat data five years ago, it's become now a critical, commercial necessity, according to CISA infrastructure official.

Acquisition

Contractors have questions about DOD's cyber requirements

The Pentagon is making big moves to improve cybersecurity in its industrial base, but the contracting community and experts continue to wonder if it will all play out as intended.

Cybersecurity

USAF pays out $123K in 3-month bug bounty contest

The Air Force found 54 vulnerabilities following its first assessment focusing on continuous monitoring of the cloud-based Common Computing Environment.