Cybersecurity
FDIC’s Temporary Wi-Fi Network Tool Doesn’t Have Needed Security Authorizations
The program is in limbo while the tool awaits an ATO, prompting the inspector general’s office to express its “concerns.”
Cybersecurity
Army looks to revise cyber operations doctrine
Brig. Gen. Paul Stanton, the commanding general for the Army's Cyber Center of Excellence, said the service was in the final stages of publishing a revised field manual on how it executes cyber operations.
Cybersecurity
How a software bill of materials can help solve our supply chain woes
As the software equivalent of a list of ingredients seen on food labels, an SBOM would reveal the provenance of direct and indirect dependencies contained in a particular piece of software.
Cybersecurity
States Snag $240M to Combat Unemployment Fraud
The federal grant funding can be used to pay for identity verification services, cybersecurity, or other expenses related to fraud detection.
Cybersecurity
Background Check Agency Wants a Social Media Search Tool
The Defense Department office charged with investigating potential insider threats wants to use social media to add context to allegations.
Cybersecurity
Census servers hacked in 2020
A watchdog report indicates that aging remote-access servers at the Census Bureau were successfully targeted by hackers in early 2020 using a known vulnerability, and while no data was stolen, the incident revealed flaws in the bureau's cybersecurity response.
Ideas
Building Resiliency into the Future of the Federal Government
Creating a digital workplace that enables government users to work virtually from anywhere with the productivity, personalization and security they need is vital to digital resiliency.
Cybersecurity
Government-industry communication, the Soraya Correa way
Steve Kelman takes a look at the former DHS chief procurement officer's push for reverse industry days and other dialogue-drivers.
Ideas
The Pentagon Needs a Strategy That Does Not Hinge on Fragile Networks
A failed wargame should make us think twice about “connect-everything” plans.
Digital Government
DOD IG Issues Guidance for Removing Sensitive Tech and Data from Afghanistan
Service members’ records were mishandled during previous contingency operations. The watchdog suggested learning from the past.
Cybersecurity
Homeland Security Considering CMMC-like Compliance Effort
The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices.
Cybersecurity
Senate panel wants DHS to focus intel activities on foreign threats
The Senate version of the annual intelligence authorization bill, which passed out of committee last week, includes a warning to DHS' intelligence arm to distinguish more carefully between its foreign and domestic missions.
Ideas
Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises
The company will use some clever math to sniff them for instances of child abuse without looking at the photos.
Cybersecurity
White House Memo Orders Agencies to Identify Critical Software
The memo follows up President Joe Biden’s executive order in May.
Cybersecurity
New Solarium report highlights policy strides, funding stumbling blocks
Much of the Cyberspace Solarium Commission's recommendations are "on track" to being implemented, but funding issues loom for some.
Ideas
Defense Leaders Can Mitigate Telework Risks
Remote work promises to make the workforce more responsive and efficient, but it also presents significant security challenges, a former ODNI cyber chief says.
Cybersecurity
A tribute to Soraya Correa, DHS' procurement icon
Steve Kelman reflects on a 40-year career that brought real innovation to federal acquisition.
Cybersecurity
DOD looks for answers on GPS data spoofing
The Defense Department is looking for technology solutions to obviate the growing threat of location data spoofing targeting satellite-based systems.
Cybersecurity
House Republicans Ask Commerce to Add Former Huawei Entity to Government Blacklist
They also requested a briefing from the End-User Committee which designates additions to the Entity List.
Cybersecurity