Can DoD Develop Effective Cyber Deterrents?
While the Pentagon’s 2015 Cyber Strategy emphasizes the importance of effective cyber deterrence, the U.S. has yet to develop a clear deterrent policy that would raise the stakes for adversaries and dissuade them from considering on how it will respond to cyber attacks on critical national infrastructure.
A decade after launching its Command Post of the Future, the Army aims for a more integrated battlefield command system that can push further toward the tactical edge.
President Trump’s choice for White House Cybersecurity Coordinator is a former head of the National Security Agency’s Tailored Access Operations team, the NSA’s offensive cyber unit. Here’s what he thinks about security.
Rob Joyce, White House Cybersecurity Coordinator, brings to the job years of experience with the National Security Agency and its Tailored Access Operations unit. In an unusual public appearance at USENIX 2016 last August, he described how institutions can best protect their networks from attack.
What We’re Reading
At least 500 million Yahoo users had their information stolen in 2014, the company said on Thursday — a year when half of American adults had their personal information exposed to hackers. Several more big names have been attacked since.
The Department of Defense announced today that it has awarded a contract to HackerOne and Synack to create a new contract vehicle for DOD components and the services to easily launch their own ‘bug bounty’ challenges, similar to Hack the Pentagon, with the ultimate objective to normalize the crowd-sourced approach to digital defenses.
The Census Bureau will forge ahead with its plans to tally and mark addresses in fiscal 2017 and with its 2018 tests to ensure that new technologies and methodologies are ready for the decennial census in 2020.
Many current and former federal employees who signed up for identity protection services after the cyber theft of their personal information soon will have to re-enroll to keep that coverage, administration officials said Monday.
America’s spirit of ingenuity and entrepreneurship created the world’s most innovative economy and keeps us dominant in today’s digital age. Indeed, in 1985 about 2,000 people used the Internet; today, 3.2 billion people do. What started out as a useful tool for a few is now a necessity for all of us—as essential for connecting people, goods, and services as the airplane or automobile.
There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.
The Army is getting up-to-date on cyber and electromagnetic activity policies, finally releasing the long-anticipated updated field manual for cyber and EW functions. The document, titled FM 3-12 “Cyberspace and Electronic Warfare Operations,” and dated for mid-April, though publicly released within the last week, replaces FM 3-38, which provided the initial guidance back in 2014.
The ‘best and brightest’ hackers could accelerate the search for vulnerabilities across some of the Defense Department’s broader critical infrastructure.
Washington University School of Medicine employee responded to a phishing attempt masked as a legitimate request in December, but medical school officials didn’t learn of the incident for seven weeks.