Cybersecurity

White House Tasks NIST with Producing Another Cybersecurity Framework

The administration touted private-sector commitments to improve cybersecurity through training and design.

Cybersecurity

DHS Launching First Federal Civilian Position Exempt from Longevity Requirements

The Cyber Talent Management System has been in the works since a 2014 law granted the department authorities to sidestep rigid classification formats such as the General Schedule.

Cybersecurity

DHS stands up new excepted service for cyber talent

The new human resources system, which is launching seven years after legislation authorizing special pay for cybersecurity specialists, is a complete move away from traditional federal HR practices, the agency said.

Cybersecurity

White House Announcements to Focus on Advancing Cybersecurity Talent

Commitments are also expected from the public and private sectors for improving the security of foundational technology.

Modernization

On TikTok, Misogyny and White Supremacy Slip through 'Enforcement Gap'

A new report shows how extremists use profiles, hashtags and other effects that violate the platform’s community guidelines.

Cybersecurity

U.S. Expands Cybersecurity Collaboration with Singapore

The move comes as China has become more assertive in the region.

Cybersecurity

Hackers Strike Another Hospital System

Cybercriminals struck Memorial Health System, a nonprofit that runs three hospitals, outpatient service sites and clinics spread across southeastern Ohio and northwestern West Virginia.

Cybersecurity

IG: 5 Things USAID Needs to Do to Better Protect Personally Identifiable Information

A recent audit showed gaps remain in the agency’s policies despite progress over the last seven years.

Cybersecurity

CISA Offers Tips to Protect Data in Face of Evolving Ransomware Attacks

The cybersecurity agency warned attackers now threaten to sell or leak stolen data, not just render systems unusable.

Cybersecurity

FDIC’s Temporary Wi-Fi Network Tool Doesn’t Have Needed Security Authorizations

The program is in limbo while the tool awaits an ATO, prompting the inspector general’s office to express its “concerns.”

Cybersecurity

Army looks to revise cyber operations doctrine

Brig. Gen. Paul Stanton, the commanding general for the Army's Cyber Center of Excellence, said the service was in the final stages of publishing a revised field manual on how it executes cyber operations.

Cybersecurity

How a software bill of materials can help solve our supply chain woes

As the software equivalent of a list of ingredients seen on food labels, an SBOM would reveal the provenance of direct and indirect dependencies contained in a particular piece of software.

Cybersecurity

States Snag $240M to Combat Unemployment Fraud

The federal grant funding can be used to pay for identity verification services, cybersecurity, or other expenses related to fraud detection.

Cybersecurity

Background Check Agency Wants a Social Media Search Tool

The Defense Department office charged with investigating potential insider threats wants to use social media to add context to allegations.

Cybersecurity

Census servers hacked in 2020

A watchdog report indicates that aging remote-access servers at the Census Bureau were successfully targeted by hackers in early 2020 using a known vulnerability, and while no data was stolen, the incident revealed flaws in the bureau's cybersecurity response.

Ideas

Building Resiliency into the Future of the Federal Government

Creating a digital workplace that enables government users to work virtually from anywhere with the productivity, personalization and security they need is vital to digital resiliency.

Cybersecurity

Government-industry communication, the Soraya Correa way

Steve Kelman takes a look at the former DHS chief procurement officer's push for reverse industry days and other dialogue-drivers.

Ideas

The Pentagon Needs a Strategy That Does Not Hinge on Fragile Networks

A failed wargame should make us think twice about “connect-everything” plans.

Digital Government

DOD IG Issues Guidance for Removing Sensitive Tech and Data from Afghanistan

Service members’ records were mishandled during previous contingency operations. The watchdog suggested learning from the past. 

Cybersecurity

Homeland Security Considering CMMC-like Compliance Effort

The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices.