Cybersecurity

Filter Protects Against Deepfake Photos and Videos

Researchers have created an algorithm that generates an adversarial attack against facial manipulation systems in order to corrupt and render useless attempted deepfakes.

FBI Opens a New China-Related Counterintelligence Investigation Every 10 Hours, Director Says

China is ramping up illegal activity to subvert the U.S. during the pandemic, according to FBI Director Chris Wray.

Administration Asks Energy Companies to Report on Supply Chain Vulnerabilities

Industry leader has yet to take action promised in congressional testimony last year.

Experts Break Down GSA’s Abrupt Cancellation of $15B Small Business IT GWAC

Four federal contracting experts joined Nextgov to discuss what happened with Alliant 2 Small Business, what’s next for the family of contracts and what this means for GSA’s suite of small business vehicles.

DevSecOps: The Benefits of a More Dynamic DOD

Leveraging unclassified resources for the development of code to be run in a classified manner has many tangible advantages.

Senate Defense Authorization Amendment Looks to Advance More Secure Software Procurement

Defense officials would outline requirements and procedures with implications for all the federal government.

GSA Opens Bids for Largest Governmentwide Small Business Contract to Date

The final request for proposals is out for GSA’s IT services-focused 8(a) STARS III contract, which will have a ceiling of $50 billion.

CISA Stands to Gain Powers Under Both Versions of the Defense Authorization Bill

An amendment on the Senate-side bill would grant the agency subpoena power over internet service providers.

Artificial Intelligence Systems Will Need to Have Certification, CISA Official Says

A process for vetting algorithms and their input data is needed to build confidence in the tech but is still very far off.

Amid COVID-19, Government Seeks Virtual Summer Interns

Virtual internships with the government are a possibility for students.

House Committee Leader Wants Oversight of Pentagon’s Handling of Banned Chinese Gear

One observer says prospects look dim for contractors requesting an extension on compliance with provisions in the National Defense Authorization Act.

DHS, NSA Conclude Pilot of Automated Mobile App Security Vetting Tool

While the program still has a ways to go, the team says it now has a way to automate mobile app security testing.

NASA Watchdog Reports on Why the Agency Still Struggles with Cybersecurity

Almost half of the controls in an overarching shared system were assessed as deficient.

Industry Calls on Government to Invest Billions for Developing Secure 5G Networks 

Comments to the NTIA also say the administration shouldn’t choose winners and losers to compete with Chinese telecoms giant Huawei.

Intelligence Authorization Would Add to Due Process Rules for Security Clearance Reviews

Also new in the bill is a provision allowing the government to share negative information about contractors with their companies.