Cybersecurity
DHS faces a sea change
Former Coast Guard Commandant Thad Allen said DHS must make structural changes so it can improve the way it develops and buys technology.
Emerging Tech
How Twitter Bots Shape the Election
Between the first two presidential debates, a third of pro-Trump tweets and nearly a fifth of pro-Clinton tweets came from automated accounts.
Cybersecurity
GAO Plans OPM, FedRAMP Audits in 2017
The office also plans to review how well CDC and NIH are protecting health information.
Cybersecurity
As Many as 150K OPM Hack Victims Must Re-Enroll to Keep Protection Services
OPM is switching benefit providers after initial contract expires.
Cybersecurity
How to flip the cyberthreat paradigm
By thinking like an adversary, federal agencies can find and fix organizational weaknesses before the bad guys can exploit them.
Cybersecurity
What the federal CISO needs to get the job done
Newly appointed federal CISO Brig. Gen. Gregory Touhill needs the right tools and enforcement authorities to secure and defend government networks.
Cybersecurity
Next steps after attribution: Deterring further Russian interference
A cybersecurity expert argues that the U.S. should enlist other countries in its response to Russia’s interference in the 2016 elections.
Cybersecurity
The Inevitability of Being Hacked
We built a fake web toaster, and it was compromised in an hour.
Cybersecurity
Hackers Find Blood Donor Info, Attack an Adobe Zero Day and Deface Russian Website
Just another week in cybersecurity.
Cybersecurity
The Future of Privacy Is Plausible Deniability
In a hackable world where neither NSA nor Sony Pictures nor John Podesta could safeguard their private communications, the surest way to keep data secure may be surrounding it with decoys.
Digital Government
How Facebook’s Ad Tool Fails to Protect Civil Rights
The company’s platform lets advertisers exclude people of certain races from seeing their content. That’s a serious problem when it comes to promotions such as housing, credit and jobs.
Cybersecurity
New Rule Takes Handcuffs Off Ethical Hackers
White hat hackers can now search for software vulnerabilities without fear of violating copyright law.
Cybersecurity
Inside a Hacking Competition to Take Down a Water-Treatment Plant
This is how hackers play capture the flag.
Digital Government
FBI Investigates More Emails Related to Clinton
Director James Comey tells lawmakers the bureau has uncovered more emails and is reviewing them “to determine if they contain classified information.”
Cybersecurity
Australian Red Cross Leaks Info of Half a Million Blood Donors
Global Organizations // Australia
Cybersecurity
CIA to put millions of declassified documents online
The intelligence agency is shifting its collection of declassified documents from an offline National Archives workstation to the public-facing CIA.gov website.
Cybersecurity
CRS fact-checks Trump claim of ICE endorsement
A Congressional Research Service legal sidebar explains why campaign trail claims that ICE endorsed Donald Trump for president are not accurate.
Ideas
Makeup of Region’s Cyber Ecosystem Offers Clues to Where More Investments are Needed
Federal procurement data shows at least half of the cybersecurity companies in the greater Washington region have derived revenue from government contracts in recent years.
Cybersecurity