Cyber Defense
FCC selects ioXt Alliance to lead cyber labeling program
The prior lead administrator withdrew from the Biden-era Cyber Trust Mark initiative after the launch of a Trump administration probe into its alleged China ties.
Data is a strategic asset and a strategic vulnerability
COMMENTARY | Treating data a strategic asset and defending it accordingly isn't simply a matter of technology policy; it's a fundamental component of national resilience.
US push to counter hackers draws industry deeper into offensive cyber debate
The White House is expanding the market for offensive cyber capabilities — and drawing more of the private sector into that ecosystem — even as policy boundaries around their use remain unclear.
EU wants to support bedrock cyber vulnerability program, top official says
U.S. congressional staffers are also working on legislation to give CISA more oversight of the Common Vulnerabilities and Exposures program after a contracting incident last April.
ODNI is building a framework to boost spy agencies’ AI adoption
A tech modernization push launched last year also included expanded threat hunting across IC networks, according to an official.
Ex-NSA leaders say Americans are becoming ‘numb’ to cyber threats
A serious cyberattack hasn’t prompted a strong enough policy or public reaction, one former director said.
National cyber director doesn’t envision industry doing offensive hacking
Sean Cairncross wants the private sector to use its technical prowess to inform U.S. government offensive and defensive decisions.
Trump’s new cyber strategy details more offensive response to cyber threats
“Unlike other Administrations, the Trump Administration will not tinker at the edges and apply partial measures and ambiguous strategies that neglect the growing number and severity of cyber threats,” the strategy said.
Exclusive
Trump’s CISA nominee said he left Coast Guard to address GOP hold
Sean Plankey confirmed the intent to Nextgov/FCW and said he’s “prepared to lead the nation’s cyber defense agency to protect the federal civilian networks and our nation’s critical infrastructure from physical and cyber attacks.”
Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says
iVerify has described the activity as the “first known mass iOS attack” campaign of its kind. Google said fragments of the exploit first appeared last February, with ties to an unnamed “customer of a surveillance company.”
Why the convergence of AI and cybersecurity must be a top priority for the administration
COMMENTARY | Here’s what a strategy could look like.
US cyber responses will be ‘linked to adversary actions’ and involve industry coordination, official says
That dynamic will be outlined in a national cyber strategy, which will be released “soon,” said ONCD’s Alexandra Seymour.
Featured eBooks