Cybersecurity

FDIC’s Temporary Wi-Fi Network Tool Doesn’t Have Needed Security Authorizations

The program is in limbo while the tool awaits an ATO, prompting the inspector general’s office to express its “concerns.”

Cybersecurity

Army looks to revise cyber operations doctrine

Brig. Gen. Paul Stanton, the commanding general for the Army's Cyber Center of Excellence, said the service was in the final stages of publishing a revised field manual on how it executes cyber operations.

Cybersecurity

How a software bill of materials can help solve our supply chain woes

As the software equivalent of a list of ingredients seen on food labels, an SBOM would reveal the provenance of direct and indirect dependencies contained in a particular piece of software.

Cybersecurity

States Snag $240M to Combat Unemployment Fraud

The federal grant funding can be used to pay for identity verification services, cybersecurity, or other expenses related to fraud detection.

Cybersecurity

Background Check Agency Wants a Social Media Search Tool

The Defense Department office charged with investigating potential insider threats wants to use social media to add context to allegations.

Cybersecurity

Census servers hacked in 2020

A watchdog report indicates that aging remote-access servers at the Census Bureau were successfully targeted by hackers in early 2020 using a known vulnerability, and while no data was stolen, the incident revealed flaws in the bureau's cybersecurity response.

Ideas

Building Resiliency into the Future of the Federal Government

Creating a digital workplace that enables government users to work virtually from anywhere with the productivity, personalization and security they need is vital to digital resiliency.

Cybersecurity

Government-industry communication, the Soraya Correa way

Steve Kelman takes a look at the former DHS chief procurement officer's push for reverse industry days and other dialogue-drivers.

Ideas

The Pentagon Needs a Strategy That Does Not Hinge on Fragile Networks

A failed wargame should make us think twice about “connect-everything” plans.

Digital Government

DOD IG Issues Guidance for Removing Sensitive Tech and Data from Afghanistan

Service members’ records were mishandled during previous contingency operations. The watchdog suggested learning from the past. 

Cybersecurity

Homeland Security Considering CMMC-like Compliance Effort

The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices.

Cybersecurity

Senate panel wants DHS to focus intel activities on foreign threats

The Senate version of the annual intelligence authorization bill, which passed out of committee last week, includes a warning to DHS' intelligence arm to distinguish more carefully between its foreign and domestic missions.

Ideas

Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises

The company will use some clever math to sniff them for instances of child abuse without looking at the photos.

Cybersecurity

New Solarium report highlights policy strides, funding stumbling blocks

Much of the Cyberspace Solarium Commission's recommendations are "on track" to being implemented, but funding issues loom for some.

Ideas

Defense Leaders Can Mitigate Telework Risks

Remote work promises to make the workforce more responsive and efficient, but it also presents significant security challenges, a former ODNI cyber chief says.

Cybersecurity

A tribute to Soraya Correa, DHS' procurement icon

Steve Kelman reflects on a 40-year career that brought real innovation to federal acquisition.

Cybersecurity

DOD looks for answers on GPS data spoofing

The Defense Department is looking for technology solutions to obviate the growing threat of location data spoofing targeting satellite-based systems.

Cybersecurity

House Republicans Ask Commerce to Add Former Huawei Entity to Government Blacklist

They also requested a briefing from the End-User Committee which designates additions to the Entity List.

Cybersecurity

Agency zero trust does not start from point zero

The good news is that consistent IT policy spanning previous presidential administrations has allowed the federal government to slowly put the necessary building blocks in place for the inevitable zero trust architecture journey.