'Hack DHS' Bug Bounty Program to Begin Second Phase with New Contract Request

The contract is geared toward companies that can conduct crowdsourced events and competitions for vetted security researchers, to help bolster DHS’ cyber resilience.

IT Modernization

DHS Research Arm Seeks Science, Tech Capabilities to Protect U.S. Agriculture

The agency issued a request for information to support its Food, Agriculture and Veterinary Defense program.


New Photos Suggest How Trump, Flush with Power, May Have Sent Official Documents down the Toilet

Photos showing what appear to be torn-up documents in two different toilets may provide more evidence of the former president’s habit of destroying his presidential documents.

Sponsor Content

5G’s Role in Next-level Infrastructure

5G is set to be a crucial part of the infrastructure that powers a range of technologies that rely on next-generation connectivity.

Emerging Tech

Mobile Threats Prompt Operational Changes for Government Staff

More than 80% of public sector respondents to a recent survey said they have been forced to re-evaluate workplace practices as attacks on mobile devices grow.

CXO Briefing

The Pentagon’s Plan to Speed Up Software Buying for Weapons Systems

The DOD’s dedicated software acquisition pathway is nearly two years old, and is already being used by a few dozen programs.


FCC, FEMA Raise Alarm Bells About Vulnerabilities in Emergency Alert System

Both agencies warned that software and equipment vulnerabilities could allow hackers to transmit fake emergency messages or disrupt real ones. 


FEC to Vote on Google’s Plan to Keep Campaign Emails Out of Spam

Google’s proposal to allow emails from authorized candidates and committees to be exempt from the company’s spam filters has received pushback from Democrats, Republicans and the general public.


Top Malware of 2021 Has Been in Use for Years, CISA Warns

The advisory highlights that such usage offers “opportunities to better prepare” and provides recommendations to mitigate cybersecurity threats.

Sponsor Content

Compliance at the Speed of Digital Transformation

Compliance has become the equal and opposite force to digital transformation.

Emerging Tech

Treasury Sanctions Cryptocurrency Mixer

The online digital money platform has proven to act as a haven for cyber criminals looking to launder illegal cryptocurrencies.

Emerging Tech

Senate Appropriators Seek Alternatives to TMF

The House package includes a $100 million infusion for the Technology Modernization Fund, but the Senate appropriators have longstanding doubts about the no-year revolving fund.

Emerging Tech

VHA Launches New Playbook Outlining Digital Health Care Needs For Patients

The agency’s health care office is looking for better data sharing interfaces to improve patient care.

Emerging Tech

National Science Foundation Facilitates US-India Tech Research Collaboration

The National Science Foundation added $2.8 million in supplemental awards to support these projects.

Emerging Tech

Bipartisan Bill Aims to Use Grants to Increase Drone Usage For Infrastructure Assessment

The legislation would authorize grants to use American drones for infrastructure assessment and maintenance as well as for workforce training and education.

Emerging Tech

White House-cited Standard Would Bolster National Electronics Security

Protecting the supply chain is about more than ensuring semiconductor inventories, some argue.

CXO Briefing

DOD Failing to Track Progress on Military Alternatives to GPS, GAO Says

A new report says military leaders don’t have enough information to make crucial decisions about ongoing efforts to develop alternatives to the Global Positioning System.

Emerging Tech

If War Comes to Space, Who Will Control US Spy Satellites?

U.S. intelligence and military are speeding new sensors to space. They are still working on details of who’s ultimately in charge during a conflict.


Finance Sector Deals Latest Blow to Cyber Solarium Construct Teetering in NDAA

Congress will return from the August recess faced once again with the challenge of building cybersecurity policy for private providers of critical infrastructure faster than industry can tear it down.