The Exchange campaign attribution will also provide hints about the role of the first national cyber director in such incidents. NSA veteran Chris Inglis was confirmed for the position just weeks ago.
By Brad D. WilliamsSign up and get the latest news in your inbox.
We will never sell or share your information without your consent. See our privacy policy.“This is a good reminder that the GRU remains a looming threat, which is especially important given the upcoming Olympics, an event they may well attempt to disrupt,” observed John Hultquist, VP of Analysis at Mandiant Threat Intelligence.
By Brad D. WilliamsRep. Langevin criticized the 2022 budget overview for its brevity, opacity, and appearance as “nearly a carbon copy” of the 2021 document. “If DoD were a high school student, I would have called [the 2022 budget overview] plagiarism.”
By Brad D. Williams“We’re not in Kansas anymore,” Gen. Nakasone said about the cyber threat landscape and the US’s adversaries.
By Brad D. Williams“China is a second-tier cyber power but, given its growing industrial base in digital technology, it is the state best placed to join the US in the first tier,” an IISS report says.
By Brad D. WilliamsThe bad practices are aimed especially at — though not limited to — educating critical infrastructure owners and operators. This includes, of course, the defense industrial base and many who support its supply chain — from communications equipment and high-tech capabilities to electrical and mechanical components for military hardware, such as tanks, planes, and ships.
By Brad D. WilliamsWhile ATT&CK focuses on standardizing the way cyber warriors understand and talk about offensive cyber, D3FEND focuses on common defensive measures.
By Brad D. Williams“The Department of Defense officially recognizes five domains of warfare,” Rep. Langevin said. “For four of those domains, the senior civilian is a service secretary. Cyber has a deputy assistant secretary, which is four rungs lower than the other warfighting domains. Why does this make sense?”
By Brad D. Williams“We can design any scenario we want to create,” says Col. Ally Smith, CYBERCOM division chief of exercise design and planning. “That puts us out in front of what our adversaries may want to do.”
By Brad D. WilliamsSen. Warner’s draft legislation, long expected, marks one of the first attempts to create a federal law mandating cyber incident reporting by some entities. Notably, the bill provides reporting entities with a degree of privacy and legal protection.
By Brad D. Williams“The more we wait, the more vulnerable we are,” a leader told the survey takers.
By Brad D. WilliamsDespite a unanimous committee voice vote, Sen. Scott announced a hold on the CISA director nominee, as well as all other DHS nominees, until President Biden visits the border with Mexico.
By Brad D. Williams“These robust information-sharing operations are just one part of our ‘defend forward’ strategy — where we see what our adversaries are doing and share that information with our partners in an effort to better bolster both our homeland defenses.”
By Brad D. WilliamsOSCAL’s goal is to enable compliance and security assessments to keep pace in complex, fast-moving, ever-changing DevSecOps environments.
By Brad D. Williams