NSA chief announces new AI Security Center, ‘focal point’ for AI use by government, defense industry

NSA chief announces new AI Security Center, ‘focal point’ for AI use by government, defense industry
NSA chief announces new AI Security Center, ‘focal point’ for AI use by government, defense industry

“We must build a robust understanding of AI vulnerabilities, foreign intelligence threats to these AI systems and ways to counter the threat in order to have AI security,” Gen. Paul Nakasone said. “We must also ensure that malicious foreign actors can’t steal America’s innovative AI capabilities to do so.”

Biden nominates Air Force’s Haugh to lead CYBERCOM, NSA: Official

Biden nominates Air Force’s Haugh to lead CYBERCOM, NSA: Official
Biden nominates Air Force’s Haugh to lead CYBERCOM, NSA: Official

The nomination comes as Gen. Paul Nakasone plans to step down after leading both agencies for five years.

US tech firms should wargame response if China invades Taiwan, warns NSA cybersecurity chief

US tech firms should wargame response if China invades Taiwan, warns NSA cybersecurity chief
US tech firms should wargame response if China invades Taiwan, warns NSA cybersecurity chief

“You don’t want to be starting that planning the week before an invasion, when you’re starting to see the White House saying it’s coming,” said NSA’s Rob Joyce. “You want to be doing that now.”

presented by
Modernization of crypto isn’t the core mission for DoD and the IC, it’s what enables the mission

Modernization of crypto isn’t the core mission for DoD and the IC, it’s what enables the mission
Modernization of crypto isn’t the core mission for DoD and the IC, it’s what enables the mission

Modernizing cryptographic systems is a lot more complicated than a software patch or iOS update, and oftentimes unfunded, but is vital to securing the nation’s most important secrets.

Biden signs memo to secure DoD, IC national security systems

Biden signs memo to secure DoD, IC national security systems
Biden signs memo to secure DoD, IC national security systems

The memorandum pushes agencies to adopt zero-trust architecture implementation plans, cloud technologies, multifactor authentication and encryption.

‘The game has changed’: VMware exec says defense industry faces destructive cyberattacks, belligerent foes

‘The game has changed’: VMware exec says defense industry faces destructive cyberattacks, belligerent foes
‘The game has changed’: VMware exec says defense industry faces destructive cyberattacks, belligerent foes

VMware’s Tom Kellermann linked increasingly aggressive attacks to geopolitical tensions with Russia and Belarus.

presented by
Your tolerance for risk in critical comms will drive your security solution

Your tolerance for risk in critical comms will drive your security solution
Your tolerance for risk in critical comms will drive your security solution

Data protection solutions are key to the JADC2 goal of an interconnected tactical network that enables the sharing of sensor data among all military branches in every domain.

NSA Should ‘Reevaluate’ Massive IC Cloud Contract: GAO

NSA Should ‘Reevaluate’ Massive IC Cloud Contract: GAO
NSA Should ‘Reevaluate’ Massive IC Cloud Contract: GAO

The GAO decision sustained a protest from Microsoft, saying the agency’s evaluation was partly “unreasonable.”

Northrop Grumman Eyes Next-Gen SIGINT For Army

Northrop Grumman Eyes Next-Gen SIGINT For Army
Northrop Grumman Eyes Next-Gen SIGINT For Army

“So I think [the concept of integration is] so simple and yet so hard to achieve,” Northrop VP Walsmith said. “You need to be able to integrate applications, whether they’re your own or someone else’s, with ease and simplicity. It is easy to say. It’s very hard to engineer.”

DISA Head: DoD Working To Modernize ICAM, C2, Data Use

DISA Head: DoD Working To Modernize ICAM, C2, Data Use
DISA Head: DoD Working To Modernize ICAM, C2, Data Use

“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”

NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals

NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals
NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals

“In terms of weapons systems, we have computers on wings, at sea, and on land. We don’t think of [weapons systems] that way, but none of them work without computers,” NSA’s Joyce said. 

Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats

Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats
Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats

“We aim to convey that, ‘Hello, we are from the government, and we’re here to help’ is not a scary idea,” the general joked, alluding to a famous quote by former President Reagan.

Afghanistan, China, And The Gray Zone: House Committee Passes Intel Bill

Afghanistan, China, And The Gray Zone: House Committee Passes Intel Bill
Afghanistan, China, And The Gray Zone: House Committee Passes Intel Bill

The bill also requires the IC to share information with the Defense Department’s Unexplained Aerial Phenomena Task Force.

HASC Budget Markup Creates Cyber Info Sharing Capabilities, DISA Cyber Procurement Office

HASC Budget Markup Creates Cyber Info Sharing Capabilities, DISA Cyber Procurement Office
HASC Budget Markup Creates Cyber Info Sharing Capabilities, DISA Cyber Procurement Office

Notably, the committee chair’s markup calls for private sector engagement in developing new cyber threat sharing capabilities.