Cybersecurity

CBP isn't alerting air travelers to biometrics collection, watchdog says

Customs and Border Protection's facial recognition program that collects photos of air travelers is hitting its performance targets according to a Government Accountability Office audit, but passengers aren't seeing privacy information and opt-out signage.

Cybersecurity

OMB Starts Clock on Agencies Implementing Policies to Welcome Public Security Research

CISA also released a binding operational directive and will start scanning government systems for the policies when time is up in six months.

Ideas

What Agencies Need to Know About TIC 3.0 and Enabling Technology

The third version of the Trusted Internet Connection policy brings government IT closer to the capabilities available to the private sector. 

Cybersecurity

CISA, White House release vulnerability disclosure policies

The Office of Management and Budget and the Cybersecurity and Infrastructure Security Agency have released a memorandum and Binding Operational Directive guiding federal agencies on how to set up their vulnerability research and disclosure programs.

Policy

Administration’s Decision to Halt Election Security Briefings Worries Many

Director of National Intelligence John Ratcliffe said that in an effort to prevent leaks, the intelligence community will no longer provide in-person briefings to Congress about threats, only written updates.

Cybersecurity

CISA, International Counterparts Highlight Mistakes Organizations Make After a Cyber Intrusion

A lot of what’s necessary to appropriately respond to a cyber incident should happen way in advance.

Cybersecurity

OMB tees up supply chain regs

The interim regulation sets down rules for excluding vendors from federal procurement if an interagency panel deems them untrustworthy.

Cybersecurity

CISA bug bounty directive awaits White House blessing

A draft policy from the Cybersecurity and Information Security Agency instructing agencies to create vulnerability disclosure programs to allow third-party bug hunters to flag security vulnerabilities in federal systems is all-but-completed, sources say.

Cybersecurity

OMB Issues Interim Rule for Banning IT Products From Federal Systems

Any individual the Federal Acquisition Security Council deems credible could initiate a removal or exclusion order.

Ideas

The World Needs American Leadership in Setting the Technological Standards of the Future

U.S. interests are missing or under-represented in key international standardization organizations.

Cybersecurity

The U.S. Has Lots to Lose and Little to Gain by Banning TikTok and WeChat

The bans threaten Americans’ freedom of speech, and may harm foreign investment in the U.S. and American companies’ ability to sell software abroad.

Cybersecurity

Pentagon’s Contractor Cybersecurity Program Approaches Testing Phase 

The pending non-profit in charge of issuing certifications is moving forward with training for assessors as a key aspect of its arrangement with the Defense Department could be in flux. 

Cybersecurity

Cybersecurity in the telework age

Each mission environment has distinct needs and resources that don’t always fit into a “one-size-fits-all” solution.

Digital Government

The Tech Perspective Kamala Harris Could Bring to the Vice Presidency

Nextgov took a look at the record of Sen. Kamala Harris. D-Calif., on tech issues to see what technology perspective she could bring to the vice presidency. 

Cybersecurity

Ransomware Attacks Demanding Larger Payouts from Local Governments

The average ransom demanded of a local government in a cyberattack grew from $30,000 to $380,000, according to one cybersecurity firm.

Modernization

NIST Calls for Standards to Improve Forensic Capabilities in the Cloud  

The agency has been highlighting gaps in cloud standards for almost a decade now and noted a conspicuous beneficiary of the status quo.

Cybersecurity

Pentagon Plans Single-Award $11B IT Contract

The Defense Enclave Services contract could go out for bid as soon as late September.

Cybersecurity

Cyber Defenders

In this ebook, Nextgov talks to top cyber-focused officials about the programs that aim to secure federal information and networks.

Ideas

Solving the COVID Cloud Challenge

Here are five ways to secure a defense in depth strategy with a remote workforce.

Cybersecurity

The risks of supply chain threat sharing

Some of the most valuable data around supply chain threats – identifying suspicious or untrustworthy actors -- can often be legally perilous to share.