DISA Puts Trust in Zero Trust With New Strategy, Testing Lab

DISA Puts Trust in Zero Trust With New Strategy, Testing Lab
DISA Puts Trust in Zero Trust With New Strategy, Testing Lab

“Zero Trust [is] where we see a lot of departmental capabilities moving over the next 12 to 18 months,” said John Hale, chief of cloud services at DISA

NSA Warns Companies China Is Exploiting 25 Unpatched Vulnerabilities

NSA Warns Companies China Is Exploiting 25 Unpatched Vulnerabilities
NSA Warns Companies China Is Exploiting 25 Unpatched Vulnerabilities

The NSA cannot mandate patching on its own, but the new Cybersecurity Maturity Model Certification (CMMC) allows the Pentagon to penalize companies in its supply chain that fail to adequately protect their networks.

NSA Prepares Unclassified Threat Reports — From Home

NSA Prepares Unclassified Threat Reports — From Home
NSA Prepares Unclassified Threat Reports — From Home

“In small ways we’re redefining who we are as an agency,” said Wendy Noble, executive director of the NSA.

2020 Elections: NSA & Cyber Leader Is Confident Vs. Russia

2020 Elections: NSA & Cyber Leader Is Confident Vs. Russia
2020 Elections: NSA & Cyber Leader Is Confident Vs. Russia

“We’re going to know our adversaries better than they know themselves,” boasted Gen. Paul Nakasone. Would Sun Tzu be proud or worried?

A Most Noble Challenge: An Arsenal Of Democracy Against COVID-19

A Most Noble Challenge: An Arsenal Of Democracy Against COVID-19
A Most Noble Challenge: An Arsenal Of Democracy Against COVID-19

We need a modern-day WPB—call it the Antivirus Coordination Board—to set priorities and support the private sector’s research and production, while sharing information and providing prompt support when needed.

DISA Embraces ‘Zero Trust;’ Might Stop The Next Snowden

DISA Embraces ‘Zero Trust;’ Might Stop The Next Snowden
DISA Embraces ‘Zero Trust;’ Might Stop The Next Snowden

“We met with a vendor on the West Coast — I can’t say who — and saw how they had implemented it end-to-end in their own infrastructure. They looked at (cybersecurity) holistically from the user identity, to the identity of the endpoint, to the application. I was very impressed with what they had done,” says DISA’s Steve Wallace.

Israelis: Soleimani Intercept Sparked Drone Strike; US Reinforces Region

Israelis: Soleimani Intercept Sparked Drone Strike; US Reinforces Region
Israelis: Soleimani Intercept Sparked Drone Strike; US Reinforces Region

TEL AVIV: Five days ago, an undisclosed intelligence agency intercepted a telephone call made by the head of Iran’s Quds Force, Maj. Gen. Qassem Soleimani, in which he was heard ordering his proxies in Iraq to attack the US embassy in Baghdad, as well as other Israeli and American targets, with the aim of taking hostages, Israeli sources say.…

Don’t Hack Back: Call The FBI & They’ll Call NSA

Don’t Hack Back: Call The FBI & They’ll Call NSA
Don’t Hack Back: Call The FBI & They’ll Call NSA

“The average time it takes to discover a data breach is about six months,” said Hickey, a deputy assistant attorney general at the Justice Department specializing in cybersecurity and China. By the time you realize you’ve been hacked, it’s too late to “hack back” and shut down your attacker.

Air Force Joins Army Parachuting Into InfoWar; Creates New Unified Subcommand

Air Force Joins Army Parachuting Into InfoWar; Creates New Unified Subcommand
Air Force Joins Army Parachuting Into InfoWar; Creates New Unified Subcommand

The Air Force wants to develop information warfare capabilities to “deter malign activities from [the] information warfare level all the way up to conflict,” says Air Combat Command head Gen. Mike Holmes.

NSA’s Cybersecurity Directorate Is ‘Back to the Future’

NSA’s Cybersecurity Directorate Is ‘Back to the Future’
NSA’s Cybersecurity Directorate Is ‘Back to the Future’

The elevation of the cybersecurity mission to “its own Directorate raises its stature in NSA to a prominence that is absolutely needed,” says one former NSA official.

Can NSA Stop China Copying Its Cyber Weapons?

Can NSA Stop China Copying Its Cyber Weapons?
Can NSA Stop China Copying Its Cyber Weapons?

China is copying malware the NSA has used against them. Is this preventable or is it an inherent weakness of cyber warfare?

Cyber Warfare In The Grey Zone: Wake Up, Washington

Cyber Warfare In The Grey Zone: Wake Up, Washington
Cyber Warfare In The Grey Zone: Wake Up, Washington

WASHINGTON: The entire US government — not just the Pentagon — needs to wake up to the intertwined threats of cyber warfare and political subversion, Army and National Security Agency officials say. It’ll take a major cultural change to get the whole of government to compete effectively in the grey zone between peace and war.…

Huge Intel Leadership Shifts: New Directors For NRO, NGA

Huge Intel Leadership Shifts: New Directors For NRO, NGA
Huge Intel Leadership Shifts: New Directors For NRO, NGA

NGA HQ: The low grinding noise you could barely hear yesterday was the sound of the tectonic plates of American intelligence shifting as the National Geospatial Intelligence Agency and the National Reconnaissance Agency got new directors. The nugget of news is that Vice Adm. Bob Sharp replaces Robert Cardillo as NGA director and President Trump…

Big Bad Data: Achilles’ Heel of Artificial Intelligence

Big Bad Data: Achilles’ Heel of Artificial Intelligence
Big Bad Data: Achilles’ Heel of Artificial Intelligence

An adversary who has access to the dataset your AI trained on can figure out what its likely blind spots are, said Brian Sadler, a senior scientist at the Army Research Laboratory: “If I know your data, I can create ways to fake out your system.”