Emerging Tech

The Trump Administration’s Plan to Usher in ‘Second Bold Era’ of Science and Technology

The administration’s lead budget and science policy shops released an outline of funding priorities to maintain America’s competitiveness through research and development of new technologies.


The Pentagon Is Exploring New Ways to Isolate Its Networks

Three companies have already received multimillion-dollar contracts to explore new ways to protect the data flowing through the military’s IT systems.


DHS Asks for Feedback on Vulnerability Disclosure Program

Officials plan to create a public form where security researchers can submit weaknesses they uncover in the agency’s IT infrastructure.


CISA: Small Planes Vulnerable to Flight Data Manipulation

Pilots would be unable to tell the difference between the real and fake readings, “which could result in loss of control of the affected aircraft,” CISA officials warned.


How Penetration Testing Helps Agencies Spot Overlooked Cyber Threats

Security officials said the “ethical hacking” practice has been critical in helping them identify unseen risks.


CISA Cuts Deadline For Patching Critical Weaknesses In Half

A new binding operational directive requires agencies to patch critical vulnerabilities in just over two weeks.


How to Build a Better Password Than ‘123456’

The U.K.’s National Cyber Security Centre offers simple advice for people and organizations for more secure options.


Which Country has the Best Cybersecurity? It Isn’t the U.S.

A study says the U.S. is above average when it comes to cybersecurity, but it’s not the best nation.

CIO Briefing

The History of Women in Science Is Hidden in Plain Sight

By searching through footnotes, researchers found female programmers who made important but unrecognized contributions to genetics.


Researchers: Flaws In Vendor Security Software Could Leave Some Federal Buildings Vulnerable

Poor credential management could let bad actors enter secure buildings, lock doors and download or change federal employee and contractor data.


Election Security is a Key Part of House Democrats' Reform Bill

H.R. 1 would codify many of the security measures lawmakers have pushed for the last two years.


Pentagon Researchers Test 'Worst-Case Scenario' Attack on U.S. Power Grid

Over 100 people gathered off the tip of Long Island this month to roleplay a cyberattack that takes out the U.S. electric grid for weeks on end.


Where Are All the Threat Hunters?

Fewer than a fifth of organizations have a dedicated threat hunting team.


DOD Invests $34 Million in Hack the Pentagon Expansion

The new contract adds a third vendor and allows agencies to tap pre-vetted hackers throughout a product’s life cycle.


Voting Experts: Why the Heck Are People Still Voting Online?

At least 100,000 online ballots—including the votes of overseas military personnel—were cast in 2016.