Cybersecurity

NSA Cyber Chief Wants to Share Digital Threats Early and Often

The agency has historically been slow to share threat intelligence but accelerating that process would help the government get ahead of cyber adversaries, according to Anne Neuberger.

CIO Briefing

For DOD, Innovation Isn’t the Problem. So What Is?

Three officials from varying military offices focused on innovation asserted that the department’s research and development game is strong, it’s the follow-through that causes problems.

Cybersecurity

This Site Shows the Security Risks of Your Smart Devices

A new website can help you understand the security risks internet-connected devices might bring into your home.

Cybersecurity

Pentagon, NSA Laying Groundwork for AI-Powered Cyber Defenses

Officials are developing a consistent framework for collecting cyber data, which could ultimately help train tools to monitor networks and detect suspicious behavior.

Emerging Tech

Lawmaker: Congress Needs to Focus on China or Risk Being Lapped

A Hawaii lawmaker said Congress needs more focus—and expertise—on the many threats China poses to the U.S.

Cybersecurity

Lawmakers Want to Expand DHS' Cyber Monitoring Program to State and Local Governments

Under a forthcoming bill, lawmakers also aim to make it easier for agencies to put the data collected under the program to good use.

Ideas

The Dangers in Smart Cities

Smart cities make for a larger attack footprint, and more potentially devastating results from a breach or hack.

IT Modernization

Watchdog: IT Troubles Limited FEMA’s Response to 2017 Hurricanes, Wildfires

The flaws, some of which date back more than a decade, left first responders scrambling to gather, share and access critical information.

Ideas

Cryptology from the Crypt: How I Cracked a 70-year-old Coded Message from Beyond the Grave

The code was created by the late Cambridge professor and scientist Robert Henry Thouless, who passed away in 1984.

Cybersecurity

Why Hong Kongers Are Toppling Lampposts

For protesters, claims of Chinese surveillance are politically useful, even when they can’t be proved.

Cybersecurity

DHS: App Vetting Tools Are a Must-Have for Agencies, Despite Their Flaws 

There’s still no ideal way to integrate mobile security tools, but that shouldn’t stop agencies from using them, according to Homeland Security researchers.

Cybersecurity

Senior Justice Official Caught Watching Porn on Government Computer

The then-deputy assistant attorney general resigned after investigators found a trove of sexually explicit content on their computer.

Cybersecurity

The Pentagon Is Exploring New Ways to Isolate Its Networks

Three companies have already received multimillion-dollar contracts to explore new ways to protect the data flowing through the military’s IT systems.

IT Modernization

Defense Department Awards Its Other Multibillion Cloud Contract

The Marine Corps plans to test Defense Enterprise Office Solutions products in degraded environments.

CIO Briefing

China’s Spies Are on the Offensive

China’s spies are waging an intensifying espionage offensive against the United States. Does America have what it takes to stop them?

Cybersecurity

DHS Asks for Feedback on Vulnerability Disclosure Program

Officials plan to create a public form where security researchers can submit weaknesses they uncover in the agency’s IT infrastructure.