Cyber Adversaries

Can New Technologies Restore a Robust Federal Cyber Perimeter?

Many agencies are deemphasizing traditional notions like perimeter security and concentrating more on the concept of resiliency, recovery and ways to mitigate the effects of a breach.

CISA Recommends Three-Pronged Approach for Mobile Security

Part of that is taking on the mindset of your potential attacker, an agency official said.

DARPA Is Taking On the Deepfake Problem

The agency wants to teach computers to detect errors in manipulated media using logic and common sense.

CISA: Small Planes Vulnerable to Flight Data Manipulation

Pilots would be unable to tell the difference between the real and fake readings, “which could result in loss of control of the affected aircraft,” CISA officials warned.

When Trump Threatens Google, Here’s What He Doesn’t Get

Days after the Treasury Secretary cleared the U.S. tech giant of national security concerns, the president was rage-tweeting again.

How to Choose Between the U.S. and China? It’s Not That Easy.

Caught between its security ally and its top trading partner, South Korea is trying to have it all.

Russian Hackers Build Fake Skype, Signal, Pornhub Apps to Lure Victims

Installing the apps activates malware that steals personal data and sends it off to St. Petersburg.

FBI Director Names China the Nation's Most ‘Severe Counterintelligence Threat’

Russia also shows no signs of stopping its election interference efforts ahead of 2020, Christopher Wray told lawmakers.

NSA Launches Cybersecurity Directorate

The group is charged with defending the country’s national security infrastructure and defense contractors against digital threats.

Featured eBooks

Lawmakers Propose Bills to Secure Connected Planes, Trains and Automobiles

The legislation would set “reasonable” security measures for the numerous IT systems that power our increasingly connected vehicles.

Industry Wants to Know Exactly What Huawei Ban Means for Contractors

While the law is clear that agencies can’t buy tech from certain companies, it is ambiguous about how that affects federal contractors and grant programs.

Ex-NSA Contractor to Serve 9 Years for Hoarding Classified Information

“Your worst enemy, after the usual suspects, is some of our own,” Harold Martin said during his sentencing hearing.

Bipartisan Legislation Targets Chinese Firm Huawei

Congress wants to up its authority on emerging tech threats from China.

Government May Tap Older Tech to Secure Modern Infrastructure

There might be something to keeping physical switches in power grids.

Suspected Iranian Cyber Attacks Show No Sign of Slowing

As Iran and the U.S. trade cyber blows, a new warning shows that the online fight is likely to go on.

Report: Pentagon Should Assume U.S. Satellites Are Already Hacked

As U.S. and its allies tether more of their military operations to government and commercial satellites, they need to start taking cybersecurity more seriously.