Digital Government
DOD IG Issues Guidance for Removing Sensitive Tech and Data from Afghanistan
Service members’ records were mishandled during previous contingency operations. The watchdog suggested learning from the past.
Cybersecurity
Homeland Security Considering CMMC-like Compliance Effort
The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices.
Cybersecurity
Senate panel wants DHS to focus intel activities on foreign threats
The Senate version of the annual intelligence authorization bill, which passed out of committee last week, includes a warning to DHS' intelligence arm to distinguish more carefully between its foreign and domestic missions.
Ideas
Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises
The company will use some clever math to sniff them for instances of child abuse without looking at the photos.
Cybersecurity
White House Memo Orders Agencies to Identify Critical Software
The memo follows up President Joe Biden’s executive order in May.
Cybersecurity
New Solarium report highlights policy strides, funding stumbling blocks
Much of the Cyberspace Solarium Commission's recommendations are "on track" to being implemented, but funding issues loom for some.
Ideas
Defense Leaders Can Mitigate Telework Risks
Remote work promises to make the workforce more responsive and efficient, but it also presents significant security challenges, a former ODNI cyber chief says.
Cybersecurity
A tribute to Soraya Correa, DHS' procurement icon
Steve Kelman reflects on a 40-year career that brought real innovation to federal acquisition.
Cybersecurity
DOD looks for answers on GPS data spoofing
The Defense Department is looking for technology solutions to obviate the growing threat of location data spoofing targeting satellite-based systems.
Cybersecurity
House Republicans Ask Commerce to Add Former Huawei Entity to Government Blacklist
They also requested a briefing from the End-User Committee which designates additions to the Entity List.
Cybersecurity
Agency zero trust does not start from point zero
The good news is that consistent IT policy spanning previous presidential administrations has allowed the federal government to slowly put the necessary building blocks in place for the inevitable zero trust architecture journey.
Modernization
NSA Awards Secret $10 Billion Contract to Amazon
Much of the NSA’s most prized intelligence data may be moving to the cloud.
Podcasts
Critical Update: How Federal Agencies Can Help Avert Quantum Catastrophe
The White House is working on plans to roll out new cryptographic systems that will require epic levels of funding from Congress and coordination, both within the government and in partnership with industry.
Ideas
What Is Pegasus? A Cybersecurity Expert Explains How the Spyware Invades Phones and What It Does When It Gets In
Since 2019, Pegasus users have been able to install the software on smartphones with a missed call on WhatsApp.
Cybersecurity
CISA Steps Up Governmentwide Recruitment Effort With New Training Guide
The guide brings together various ways the agency and its partners are trying to address the government's perennial workforce challenge.
Ideas
Augmentation for Data-Driven Success
Augmentation techniques can help the Defense Department implement its data strategy goals.
Cybersecurity
Inconsistent job coding may undercut DOD’s cyber workforce efforts
A DOD inspector general audit found that while the Pentagon has made strides, inconsistent job coding for civilian cyber work roles across filled and vacant positions may hinder recruiting and retention.
Cybersecurity
NIST Updates Cyber Resiliency Guide to Account for Increasingly Sophisticated Threats
Public feedback on the more than 200-page document will be considered in the near future.
Cybersecurity
CISA Stands Up Joint Cyber Defense Collaborative
The effort includes partnerships with several major tech companies.
Cybersecurity