Modernization
OMB to Agencies: Time to Finish IPv6 Transition
Before the end of fiscal 2021, agencies will need to have a plan in place to hit 80% IPv6-only systems by 2025.
Cybersecurity
Some Election-Related Websites Still Run on Vulnerable Software Older Than Many High Schoolers
Our analysis found that websites in dozens of towns and counties voting on Super Tuesday have security weaknesses. Richmond, Va., still uses software from 2003.
Cybersecurity
Senate Commerce Committee Is Cooking Up a Bill to Support Cyber Grand Challenges
Presidential advisers want their cybersecurity “moonshot” to become more than just another report gathering dust.
Ideas
'Surfing Attacks' Could Let Hackers Read Your Texts
“We want to raise awareness of such a threat,” says Ning Zhang, assistant professor at the Washington University in St. Louis.
Cybersecurity
Senator Highlights Significance of Defense Department's Vulnerability Disclosure Programs
The letter follows a report that a Defense server was exploited to mine cryptocurrency.
Cybersecurity
In RSA Showdown, Analyst Says U.S. Must Choose Between Surveillance and Security
The debate highlights how the Justice Department’s push for access to encrypted data could undermine the U.S. campaign against Huawei.
Emerging Tech
Federal Regulators: Should Energy Companies Be Allowed to Use Cloud for Power Delivery?
The Federal Energy Regulatory Commission needs to understand the risks involved before enabling power companies to adopt cloud technologies.
Digital Government
More Legislation May Be Coming to Bolster the Federal Cyber Workforce
Industry sees focus on education as a path to ending competition over personnel.
Cybersecurity
Spy law reauthorization postponed to avoid tough privacy votes
A markup to reauthorize the USA Freedom Act was pushed back indefinitely as members deal with the fallout of a new oversight report and Rep. Zoe Lofgren (D-Calif.) prepares to introduce a number of proposed amendments.
Cybersecurity
Lawmakers press DHS chief on drug detection tech
Illicit drug shipments through land ports of entry concern lawmakers who asked acting Homeland Security chief Chad Wolf for details on the technology to stop them.
Cybersecurity
CISA Director Pushes to Discontinue Social Security Numbers as Identification
Industry is eager to promote alternatives and improvements for digital identity.
Ideas
FBI Cyber Crime Report Shows the Weakness of Password Protection
It’s time we see passwords for the paper tigers that they are.
Cybersecurity
TRANSCOM head says contractors struggle with advanced persistent threats
The lead general for TRANSCOM threw support behind the Defense Department's impending unified cybersecurity standard for contractors, the Cybersecurity Maturity Model Certification, as contractors struggle with advanced persistent threats.
Cybersecurity
Government-Run Energy Company Keeps Reeling in the Same Employees in Phishing Training
The Tennessee Valley Authority has a good initial phishing training program in place but lacks real consequences for those that fail.
Cybersecurity
Ransomware top of mind for DHS cyber chief
The director of the Cybersecurity and Infrastructure Security Agency said the organization has been “a little bit late to the game” recognizing the potential of ransomware to directly touch the lives of citizens, but that’s changing.
Cybersecurity
Despite improvement, Thrift Board infosec needs work
The Federal Retirement Thrift Investment Board still has not "fully developed and implemented an effective, organization-wide information security program."
Cybersecurity
End-to-End Encryption and Law Enforcement Access to Data Can Coexist, Justice Official Says
The official pointed to Australian and U.K. laws as models for the U.S. and an emerging “international consensus” on the issue.
Digital Government
Industry Offers Quick Fixes For Major Pain Points In Security Clearance Process
The background investigations backlog and wait times are down, but contractors still see hurdles in getting people cleared for sensitive work.
Cybersecurity
Report Warns of Tech Threats From ‘Other’ Chinese Companies
“The one area that China has been keen to exploit is at the state level because state governments largely are not aware of the threat it poses to them,” Sen. Marco Rubio said at the report’s release.
Emerging Tech