Govt., Critical Infrastructure

Pentagon: Contractors Will Soon Be Held to Elevated Cyber Standards

Pentagon: Contractors Will Soon Be Held to Elevated Cyber Standards

The Defense Department in recent years has implemented heightened cybersecurity regulations to protect its sensitive data, and now it must hold its industry partners to the same standards as they face the same threats, the Pentagon’s top IT official said Friday. “The cyberthreat is not going away; we have to defend our networks and systems, and you’re part of that defense,” acting DOD CIO...

There Will Be a CISO in Every Campaign, Suggests Clinton's Campaign Manager

There Will Be a CISO in Every Campaign, Suggests Clinton's Campaign Manager

“You're definitely gonna see on the next presidential campaign, every campaign will have a CISO”, said Robby Mook, the manager of Hillary Clinton's presidential campaign, as he talked about the 2016 election hacking. “I think that concept was so wild to people that it was largely brushed back”, said Mook. “It was totally treated as spin, that it was a deflection from what really...

Air Force Operationalizes Latest Cybersecurity Plans

Air Force Operationalizes Latest Cybersecurity Plans

The Air Force is now operationalizing several key elements in its cybersecurity plan. As part of this, Air Force leaders have established a new unit, The Cyber Resilience Office for Weapons Systems (CROWS). CROWS was engineered to recognize the growing scope and influence of the cyber domain necessary to strengthen cybersecurity for emerging platforms and existing platforms. Operationalizing...

Nuclear Plants, Hospitals at Risk of Hacked Devices for Monitoring Radiation

Nuclear Plants, Hospitals at Risk of Hacked Devices for Monitoring Radiation

Design flaws in devices used to monitor radiation levels in nuclear plants, hospitals, seaports, and at border controls, could be exploited by an attacker to inject phony radiation readings, a security researcher has found. Ruben Santamarta, principal security consultant at IOActive, reverse-engineered the firmware of two different brands of radiation monitoring devices as well as analyzed their...

Kaggle Data Science Community is Hosting Competition to Improve Airport Security

Kaggle Data Science Community is Hosting Competition to Improve Airport Security

Going through airport security is a universally painful experience. And despite being slow and invasive, the TSA doesn’t have a great record at catching threats. With the help of the Kaggle data science community, the Department of Homeland Security (DHS) is hosting an online competition to build machine learning-powered tools that can augment agents, ideally making the entire system...

Israeli Cyber Expert: To Stop Russia and Other Hackers, Overhaul the Internet

Israeli Cyber Expert: To Stop Russia and Other Hackers, Overhaul the Internet

The professor and ex-general who runs Israel’s prestigious annual cybersecurity conference, and who was central to the establishment of Israel’s pioneering cyber protection agencies, is calling for a radical overhaul of the internet in order to counter cyber warfare. In the course of a wide-ranging interview with The Times of Israel ahead of next week’s Tel Aviv University “Cyber Week...

White House Cyber Chief Rob Joyce to Agency Leaders: Know Your Network’s Risks

White House Cyber Chief Rob Joyce to Agency Leaders: Know Your Network’s Risks

The buck stops with agency leaders when cybersecurity breaches occur, White House Cyber Coordinator Rob Joyce reiterated on 21 June. Agency heads need to know when Chief information officers (CIOs) and chief information security officers (CISOs) have signed off on various risks, such as running outdated software. “Does leadership know they’ve accepted that risk? The buck stops with them....

National Security Agency Opens Github Account — Lists 32 Developed Projects

National Security Agency Opens Github Account — Lists 32 Developed Projects

The National Security Agency (NSA) has joined GitHub and launched an official GitHub page. The NSA is sharing 32 different projects as part of the NSA Technology Transfer Program (TTP). Many of the projects the agency listed are years old that have been available on the Internet for some time. For example, SELinux has been part of the Linux kernel for years. Some of the NSA's open source projects...

Declassified Report: NSA Hasn't Learned Snowden Lessons - Open to Insiders

Declassified Report: NSA Hasn't Learned Snowden Lessons - Open to Insiders

The US government has not learnt the lessons that Snowden so bitterly taught it according to a newly declassified report from the inspector general of US Department of Defense (DoD). The 60-page report, much of which is redacted, details several security failures that could leave the NSA open to another insider compromise. In the wake of the Snowden leak, the NSA attempted to implement various...

Spear Phishing Campaign Attacks Palestinian Law Enforcement

Spear Phishing Campaign Attacks Palestinian Law Enforcement

Palestinian law enforcement agencies and other targets within Palestine were targeted in a spear phishing campaign delivering malware to remotely control infected systems, Talos researchers reveal. The actor behind this campaign “has appeared to have used genuine documents stolen from Palestinian sources as well as a controversial music video as part of the attack,” Talos says. The attacker...

HHS Faces 500 Million Hack Attempts Per Week, Says CIO

HHS Faces 500 Million Hack Attempts Per Week, Says CIO

By virtue of possessing millions of medical records, the Department of Health and Human Services is a prime and frequent target for attempted cybersecurity intrusions. According to HHS CIO Beth Killoran's estimation, the department faces "500 million cyber hack attempts each week" and cautioned that is only going to swell in the future. "That's going to go up," she said at the MarkLogic Data...

  • More at FCW
  • |
  • |
Agencies Face a Complex Threat Landscape Entirely Full with Malware

Agencies Face a Complex Threat Landscape Entirely Full with Malware

The toolkits that cyberattackers use are now commodities, and anyone with a credit card can purchase these tools to become a hacker. These exploits are also continually evolving to evade detection and maximize damage. Not long ago, most agencies focused their security efforts on network defense. But as the number of mobile endpoints grows and, in turn, the number of entry points, this approach...

Brand New Augusta Center to Be New Training Ground for Cyber Warfare

Brand New Augusta Center to Be New Training Ground for Cyber Warfare

A new training on the banks of the Savannah River will help bolster Georgia and Augusta’s status as a cyber intelligence and information security hub, officials said on 19 June. The Georgia Cyber Innovation and Training Center, a now $60 million educational complex in downtown Augusta, will become the state’s centerpiece for cyber security research and development. It will merge public and...

  • More at AJC
  • |
  • |
Air Force Introduced Space Cyber Challenge

Air Force Introduced Space Cyber Challenge

The first Space Cyber Challenge was hosted at this year’s NSA Cyber Defense Exercise. The week-long challenge had graduate students from the Royal Military College of Canada competing against personnel from the NSA, engineers from NASA, and five airmen from the 70th Intelligence, Surveillance and Reconnaissance Wing’s 707th Communications Squadron from Fort Meade, Maryland. There were three...

Question for States: Why Isn't More DHS Grant Money Directed to Cybersecurity?

Question for States: Why Isn't More DHS Grant Money Directed to Cybersecurity?

A House bill to reauthorize the Department of Homeland Security includes a requirement to study why state and local governments have not been using homeland security grant programs to fill the large gaps in their cybersecurity defenses. The requirement was added by voice vote during a markup of the bill by the House Homeland Security Committee as an amendment. It requires figures on the amount of...

The Unending Cybersecurity Arms Race

The Unending Cybersecurity Arms Race

Across all industries, big and small companies are scattering for solutions to protect their highly sensitive information from the new cyberthreats. Cybersecurity risks are at an all time high, and they have potential to cause more damage than ever before. Here are some observations seen thus far in 2017: 1) The technology is coping to circumstances: The cybersecurity workforce is anticipated to...

Read more about the government cyber security issues and remedies

This category provides expertly curated news that majorly deals with but is not restricted to government cyber security. With the nature of confrontational engagement changing among the countries this category assumes utmost importance. The cyberspace has emerged as the fifth domain of warfare, the other four being land, water, air and space. In recent times the cross country cyber attacks have increased significantly in number, strength and sophistication. Governments are increasingly focusing now on strengthening their cyber warfare capabilities and improving their cyber arsenal. The protection of critical infrastructure from subversive and pernicious cyber attacks has assumed great importance.