Science & Tech
Quantum Computing That Can Crack Modern Encryption More Than a Decade Away
A report from the National Academies of Sciences, Engineering, and Medicine suggests encryption-cracking quantum computers are possible, but won’t be built in the immediate future.
Science & Tech
TSA Unveils Cybersecurity Roadmap
The agency identifies four priorities and six goals to address
Defense Systems
Supply chain risk in the spotlight
The National Risk Management Center at the Department of Homeland Security plans to have lists of national critical functions and supply chain priorities in place by January.
Defense Systems
Air Force to try again on JRSS migrations
The Air Force hit pause on standing up and migrating to the Joint Regional Security Stacks after suffering connectivity problems but will reboot in 2019.
Ideas
Germany Develops Offensive Cyber Capabilities Without A Coherent Strategy of What to Do With Them
Germany has traditionally prioritized defense over offense in cyberspace. That's now beginning to change.
Defense Systems
DOD struggles with Risk Management Framework adoption
As DOD shifts away from compliance, the old methods are becoming barriers to new risk management policies.
Policy
Agencies Will Soon Have a Cyber Hygiene Score—And Will Know Where They Rank
The AWARE score will be based on data from agencies’ continuous monitoring tools and will give the Homeland Security Department a holistic view of the government’s cybersecurity posture.
Defense Systems
Defending against quantum-based threats
The Army wants to make sure American warfighters aren't behind the curve if and when quantum technology is operationalized.
Ideas
Special Report: Is the US Ready to Escalate in Cyberspace?
A barrage of cyber attacks have hit U.S. companies and institutions over the past decade. At long last, the United States says it’s ready to strike back.
Defense Systems
DARPA looks to 'less-explored' blockchain uses
The defense research agency wants insights on incentives and centralized aspects of permissionless distributed consensus protocols.
Defense Systems
Making derived mobile credentials work
The National Institute of Standards and Technology recently issued a practice guide showing two ways federal employees using mobile devices could be authenticated to access secure information systems and applications.
Defense Systems
DOD teams with DHS for critical infrastructure protection
Officials from both agencies told Congress at a joint committee hearing on cyber incident cooperation that the partnership has been fruitful, but budget constraints could require legislation.
Policy
Pentagon, DHS Spell Out How They’ll Cooperate on Cyber Defense
The memorandum of understanding comes after the Defense Department prepared to help the Homeland Security Department repel Election Day cyberattacks.
Defense Systems
$769M JCETII task order goes to Allion
Alion Science and Technology books a $769 million task order to integrate systems and subsystems for the U.S. military’s ISR and cyber platforms.
Science & Tech
Pentagon Researchers Test 'Worst-Case Scenario' Attack on US Power Grid
Over 100 people gathered off the tip of Long Island this month to roleplay a cyberattack that takes out the U.S. electric grid for weeks on end.
Defense Systems
DOD lags in implementing the Cybersecurity Information Sharing Act
Congress passed landmark cybersecurity legislation in late 2015, but Pentagon agencies have a spotty record of implementation, according to a watchdog report.
Science & Tech
DHS-Funded Tech Could Help Calculate the Costs of Cyberattacks
The agency awarded $1.3 million to research helping organizations weigh the benefits of different cyber tools.
Defense Systems
Rising Star: Capt. Keely J. Carrigan
Operations Flight Commander, 707th Communications Squadron, U.S. Air Force
Defense Systems
Rising Star: Capt. Anthony N. Rodriguez
Aide-de-Camp to the Commander of the 24th Air Force, U.S. Air Force
Defense Systems
Citizen-soldiers’ cyber solution
The Missouri National Guard Cyber Team developed a tool that cuts the time it takes to collect information from compromised servers from two days down to 20 minutes.
Almost There!
Help us tailor content specifically for you: