Cybersecurity
Cyber EO compliance is a full-time job
Unified security controls, supply chain security, zero trust and smart procurement decisions are all pieces of the puzzle.
Digital Government
After 3 Years, Key IRS Systems Still Aren’t Properly Encrypted
The inspector general attributed the delays in the agency’s data at rest encryption program to additional mandates and poor adherence to program management best practices.
Cybersecurity
House reconciliation bill includes nearly $800 million for CISA
The funding supports the implementation of President Joe Biden's May executive order on cybersecurity and workforce development.
Ideas
Apple’s Plan to Scan Your Phone Raises the Stakes on a Key Question: Can You Trust Big Tech?
Other large tech companies also have considerable control over customers’ devices and insight into their data.
Ideas
Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises
The company will use some clever math to sniff them for instances of child abuse without looking at the photos.
Podcasts
Critical Update: How Federal Agencies Can Help Avert Quantum Catastrophe
The White House is working on plans to roll out new cryptographic systems that will require epic levels of funding from Congress and coordination, both within the government and in partnership with industry.
Ideas
The State of Data Security in the Federal Government
Most agencies don’t have a solid grasp of what data they have or where it is located.
Ideas
Leveraging Encryption Keys to Better Secure the Federal Cloud
In the same way we use a key to lock valuable assets in a safe deposit box, agencies can lock up encryption keys.
Cybersecurity
FBI director wants more cooperation from ransomware victims
The bureau is seeking new funding to support cyber investigations and its own internal cybersecurity, but it also wants help from industry.
Cybersecurity
DARPA Building Special Chips for Data Privacy Protection
Fully Homomorphic Encryption is considered the “holy grail” of encryption. But right now it takes too much compute power to be used widely.
Cybersecurity
FBI Director Says Extremists Flocking to Encrypted Apps Poses New Challenges
Christopher Wray told lawmakers tech companies are the ones making policies about encryption.
Cybersecurity
CISA: Hackers access to federal networks without SolarWinds
The Cybersecurity and Information Security Agency said on Jan. 6 that there is evidence of suspected hackers are breaching federal networks without exploiting a recently discovered flaw in SolarWinds Orion product.
Ideas
Insecure Communications Like WhatsApp Are Putting U.S. National Security at Risk
The proliferation of consumer-grade communications applications has given rise to widespread, unsanctioned use throughout the military community.
Ideas
Is Now the Time to Start Protecting Government Data from Quantum Hacking?
The key to creating quantum-resistant encryption is to get away from the core strength of computers, according to one expert.
Cybersecurity
Zoom Settles with FTC On False Claims About End-to-end Encryption
Dissent to the agreement shows how the Federal Trade Commission could change under the incoming administration.
Ideas
In Response to the Lawful Access to Encrypted Data Act
There is a balance that needs to be maintained between national security posture and upholding privacy—a balance that this bill is missing.
Cybersecurity
Wednesday’s Hack Shows that The Whole World Is in Your Twitter DMs
We treat direct messages on Twitter as private conversations. Last night’s hack shows that isn’t the case.
Cybersecurity
NSA Revises Guidance on Teleworking Services for Government Users
The agency now notes end-to-end encryption may not be an option for some use cases.
Ideas