Four Cyber Trends To Watch in 2017
The four greatest cyber threats facing government institutions today are foreign hacks, botnet attacks, intelligence sharing and information manipulation. But 2017 may be the year government and industry make progress in exchanging threat information.
While the Pentagon’s 2015 Cyber Strategy emphasizes the importance of effective cyber deterrence, the U.S. has yet to develop a clear deterrent policy that would raise the stakes for adversaries and dissuade them from considering on how it will respond to cyber attacks on critical national infrastructure.
A decade after launching its Command Post of the Future, the Army aims for a more integrated battlefield command system that can push further toward the tactical edge.
Federal Chief Information Security Officer Gregory Touhill Launched an ambition five-part strategy to improve cyber education, training, investment and risk management at every level of government.
What We’re Reading
At least 500 million Yahoo users had their information stolen in 2014, the company said on Thursday — a year when half of American adults had their personal information exposed to hackers. Several more big names have been attacked since.
The Department of Defense announced today that it has awarded a contract to HackerOne and Synack to create a new contract vehicle for DOD components and the services to easily launch their own ‘bug bounty’ challenges, similar to Hack the Pentagon, with the ultimate objective to normalize the crowd-sourced approach to digital defenses.
The Census Bureau will forge ahead with its plans to tally and mark addresses in fiscal 2017 and with its 2018 tests to ensure that new technologies and methodologies are ready for the decennial census in 2020.
Many current and former federal employees who signed up for identity protection services after the cyber theft of their personal information soon will have to re-enroll to keep that coverage, administration officials said Monday.
America’s spirit of ingenuity and entrepreneurship created the world’s most innovative economy and keeps us dominant in today’s digital age. Indeed, in 1985 about 2,000 people used the Internet; today, 3.2 billion people do. What started out as a useful tool for a few is now a necessity for all of us—as essential for connecting people, goods, and services as the airplane or automobile.
The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) today introduced CyberSeek (link is external), an interactive online tool designed to make it easier for cybersecurity job seekers to find openings and for employers to identify the skilled workers they need.
There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.
It’s easy to poke holes in the cloud security effort known as the Federal Risk Authorization and Management Program (FedRAMP). Few, if really any, governmentwide programs don’t go through growing pains, including learning how to meet the needs of its customers.
The Defense Department has touted its “hack the Pentagon” bug bounty program, which is also the first in the federal government, as a wide success in appealing to the public to find network vulnerabilities. While led by the Defense Digital Service within the Pentagon, the Defense Information Systems Agency played a role in the success of this first-ever initiative as well and will continue to do so, officials said.