Ideas

How to Dampen Escalation Risks As Cyber-Attack Rules Loosen

Create standing rules of engagement and maintain the dual-hatted NSA/CyberCommand.

Policy

Republicans Balk at Democrats’ Pledge to Snub Hackers

So far, only House Democrats have chosen to hold themselves publicly accountable for how they plan to handle any stolen documents that come their way.

Defense Systems

The end of CAC? Don't hold your breath

The Defense Department's common access card will continue to be a major component of the Pentagon's evolving identity management strategy, DOD CIO Dana Deasy said.

Threats

DHS Secretary Urges Hit-Back-Harder Response to Cyber Strikes

That muscular response strategy may sow confusion and risk escalation, a cyber law scholar says.

Ideas

Washington Won’t Keep Rebuffing Moscow’s Cyber Proposals Forever

Here’s where the U.S. will find common ground with the country that attacked its 2016 election.

Science & Tech

Defense Department Seeks ‘Rapid Cloud Migration’ Ideas for MilCloud

MilCloud 2.0 is about to host a lot more data, and the Defense Department wants ideas for how to get it there faster.

Defense Systems

DHA contracts for $71M in cyber advisory services

KBR’s government arm takes a three-year, $71 million task order to assist the Defense Health Agency.

Defense Systems

DOD features prominently in Government Innovation Awards

Six defense projects and three military Rising Stars are among this year's winners.

Policy

Fund Meant to Protect US Elections May Be Too Little, Too Late

$380 million may sound like a lot — but it was originally approved in 2003, and won't be fully spent until 2023, ProPublica finds.

Threats

Government’s Getting Faster at Sharing Unclassified Cyber Threat Indicators

It’s also becoming rarer that an intelligence agency refuses to release a threat indicator entirely, a DHS official said.

Defense Systems

Army upgrades cyber training venue

A task force from the Army cyber protection teams face off against industrial control systems in a week-long cyber training exercise.

Defense Systems

Are there new rules for cyberwar?

Reports that the Trump administration has rescinded an Obama-era directive guiding the use of offensive cyber operations has cybersecurity experts pondering what, if anything, has replaced it.

Defense Systems

Marines get into the bug-bounty game

At the Las Vegas event, ethical hackers identified and reported 75 unique vulnerabilities and were awarded over $80,000 for their efforts.

Threats

An 11-Year-Old Hacked a Mock Florida Election Site in 10 Minutes

The hacking event was part of a hands-on workshop within the larger cybersecurity conference.

Science & Tech

The NGA Plans to Lock Employees In a Room Until They Learn Cyber Hygiene

The National Geospatial-Intelligence Agency will be locking employees in escape rooms to test their knowledge of cybersecurity.

Science & Tech

Hackers Find Scores of Vulnerabilities in Marine Corps Websites

The Pentagon’s latest bug-bounty contest continues a successful run of hack-the-military efforts.

Science & Tech

Russian Military Spy Software is on Hundreds of Thousands of Home Routers

In May, the Justice Department told Americans to reboot their routers. But there's more to do — and NSA says it's up to device makers and the public.

Science & Tech

California Is Automating Cyber-Threat Information Sharing

The state wants to add every city and county government to its automated threat feed program in the next three to four years.

Science & Tech

Flaw in Some Satellite Communication Terminals Can Expose US Troops’ Location

Vulnerabilities in certain brands of communications terminals can be used to access GPS data on forward-deployed troops.