“Zero Trust [is] where we see a lot of departmental capabilities moving over the next 12 to 18 months,” said John Hale, chief of cloud services at DISA
By Kelsey AthertonThe NSA cannot mandate patching on its own, but the new Cybersecurity Maturity Model Certification (CMMC) allows the Pentagon to penalize companies in its supply chain that fail to adequately protect their networks.
By Kelsey Atherton“In small ways we’re redefining who we are as an agency,” said Wendy Noble, executive director of the NSA.
By Kelsey Atherton“We’re going to know our adversaries better than they know themselves,” boasted Gen. Paul Nakasone. Would Sun Tzu be proud or worried?
By Sydney J. Freedberg Jr.We need a modern-day WPB—call it the Antivirus Coordination Board—to set priorities and support the private sector’s research and production, while sharing information and providing prompt support when needed.
By Andrew Krepinevich“We met with a vendor on the West Coast — I can’t say who — and saw how they had implemented it end-to-end in their own infrastructure. They looked at (cybersecurity) holistically from the user identity, to the identity of the endpoint, to the application. I was very impressed with what they had done,” says DISA’s Steve Wallace.
By Barry RosenbergTEL AVIV: Five days ago, an undisclosed intelligence agency intercepted a telephone call made by the head of Iran’s Quds Force, Maj. Gen. Qassem Soleimani, in which he was heard ordering his proxies in Iraq to attack the US embassy in Baghdad, as well as other Israeli and American targets, with the aim of taking hostages, Israeli sources say.…
By Arie Egozi and Colin Clark“The average time it takes to discover a data breach is about six months,” said Hickey, a deputy assistant attorney general at the Justice Department specializing in cybersecurity and China. By the time you realize you’ve been hacked, it’s too late to “hack back” and shut down your attacker.
By Sydney J. Freedberg Jr.The Air Force wants to develop information warfare capabilities to “deter malign activities from [the] information warfare level all the way up to conflict,” says Air Combat Command head Gen. Mike Holmes.
By Theresa HitchensThe elevation of the cybersecurity mission to “its own Directorate raises its stature in NSA to a prominence that is absolutely needed,” says one former NSA official.
By Theresa HitchensChina is copying malware the NSA has used against them. Is this preventable or is it an inherent weakness of cyber warfare?
By Theresa HitchensWASHINGTON: The entire US government — not just the Pentagon — needs to wake up to the intertwined threats of cyber warfare and political subversion, Army and National Security Agency officials say. It’ll take a major cultural change to get the whole of government to compete effectively in the grey zone between peace and war.…
By Sydney J. Freedberg Jr.NGA HQ: The low grinding noise you could barely hear yesterday was the sound of the tectonic plates of American intelligence shifting as the National Geospatial Intelligence Agency and the National Reconnaissance Agency got new directors. The nugget of news is that Vice Adm. Bob Sharp replaces Robert Cardillo as NGA director and President Trump…
By Colin ClarkAn adversary who has access to the dataset your AI trained on can figure out what its likely blind spots are, said Brian Sadler, a senior scientist at the Army Research Laboratory: “If I know your data, I can create ways to fake out your system.”
By Sydney J. Freedberg Jr.