Brad D. Williams
Reporter, Cyber and Networks, Breaking Defense
Brad D. Williams covers cyber, networks, and emerging tech. He has worked as a journalist and tech writer for 20 years, much of that time focusing on cybersecurity. He began his career on the night desk at a daily newspaper and then spent a decade as a senior tech writer in security operations centers, on cyber red teams, and embedded with engineers building tech for the public and private sectors. In 2015, Brad started a business specializing in cybersecurity content strategy and development. He joined Fifth Domain: Cyber at the publication’s launch in 2017 and developed an enterprise beat covering cybersecurity strategy, policy, operations, and emerging tech. Brad holds a master's degree in English and technical cybersecurity certification. Outside of work, Brad is a member of the United States Chess Federation and writes literature. bwilliams@breakingmedia.comStories by Brad D. Williams
Acting DoD CIO John Sherman said Microsoft and AWS will likely be invited to bid on JWCC, and DoD will also look at the capabilities of other US-based cloud service providers, such as Google, IBM, and Oracle.
By Brad D. Williams
The Exchange campaign attribution will also provide hints about the role of the first national cyber director in such incidents. NSA veteran Chris Inglis was confirmed for the position just weeks ago.
By Brad D. Williams
“This is a good reminder that the GRU remains a looming threat, which is especially important given the upcoming Olympics, an event they may well attempt to disrupt,” observed John Hultquist, VP of Analysis at Mandiant Threat Intelligence.
By Brad D. Williams
Rep. Langevin criticized the 2022 budget overview for its brevity, opacity, and appearance as “nearly a carbon copy” of the 2021 document. “If DoD were a high school student, I would have called [the 2022 budget overview] plagiarism.”
By Brad D. Williams
“We’re not in Kansas anymore,” Gen. Nakasone said about the cyber threat landscape and the US’s adversaries.
By Brad D. Williams
“China is a second-tier cyber power but, given its growing industrial base in digital technology, it is the state best placed to join the US in the first tier,” an IISS report says.
By Brad D. Williams
The bad practices are aimed especially at — though not limited to — educating critical infrastructure owners and operators. This includes, of course, the defense industrial base and many who support its supply chain — from communications equipment and high-tech capabilities to electrical and mechanical components for military hardware, such as tanks, planes, and ships.
By Brad D. Williams
While ATT&CK focuses on standardizing the way cyber warriors understand and talk about offensive cyber, D3FEND focuses on common defensive measures.
By Brad D. Williams
“The Department of Defense officially recognizes five domains of warfare,” Rep. Langevin said. “For four of those domains, the senior civilian is a service secretary. Cyber has a deputy assistant secretary, which is four rungs lower than the other warfighting domains. Why does this make sense?”
By Brad D. Williams
“We can design any scenario we want to create,” says Col. Ally Smith, CYBERCOM division chief of exercise design and planning. “That puts us out in front of what our adversaries may want to do.”
By Brad D. Williams
Sen. Warner’s draft legislation, long expected, marks one of the first attempts to create a federal law mandating cyber incident reporting by some entities. Notably, the bill provides reporting entities with a degree of privacy and legal protection.
By Brad D. Williams
“The more we wait, the more vulnerable we are,” a leader told the survey takers.
By Brad D. Williams
Despite a unanimous committee voice vote, Sen. Scott announced a hold on the CISA director nominee, as well as all other DHS nominees, until President Biden visits the border with Mexico.
By Brad D. Williams
“These robust information-sharing operations are just one part of our ‘defend forward’ strategy — where we see what our adversaries are doing and share that information with our partners in an effort to better bolster both our homeland defenses.”
By Brad D. Williams
Acting DoD CIO John Sherman said Microsoft and AWS will likely be invited to bid on JWCC, and DoD will also look at the capabilities of other US-based cloud service providers, such as Google, IBM, and Oracle.
By Brad D. WilliamsThe Exchange campaign attribution will also provide hints about the role of the first national cyber director in such incidents. NSA veteran Chris Inglis was confirmed for the position just weeks ago.
By Brad D. Williams“This is a good reminder that the GRU remains a looming threat, which is especially important given the upcoming Olympics, an event they may well attempt to disrupt,” observed John Hultquist, VP of Analysis at Mandiant Threat Intelligence.
By Brad D. WilliamsRep. Langevin criticized the 2022 budget overview for its brevity, opacity, and appearance as “nearly a carbon copy” of the 2021 document. “If DoD were a high school student, I would have called [the 2022 budget overview] plagiarism.”
By Brad D. Williams“We’re not in Kansas anymore,” Gen. Nakasone said about the cyber threat landscape and the US’s adversaries.
By Brad D. Williams“China is a second-tier cyber power but, given its growing industrial base in digital technology, it is the state best placed to join the US in the first tier,” an IISS report says.
By Brad D. WilliamsThe bad practices are aimed especially at — though not limited to — educating critical infrastructure owners and operators. This includes, of course, the defense industrial base and many who support its supply chain — from communications equipment and high-tech capabilities to electrical and mechanical components for military hardware, such as tanks, planes, and ships.
By Brad D. WilliamsWhile ATT&CK focuses on standardizing the way cyber warriors understand and talk about offensive cyber, D3FEND focuses on common defensive measures.
By Brad D. Williams“The Department of Defense officially recognizes five domains of warfare,” Rep. Langevin said. “For four of those domains, the senior civilian is a service secretary. Cyber has a deputy assistant secretary, which is four rungs lower than the other warfighting domains. Why does this make sense?”
By Brad D. Williams“We can design any scenario we want to create,” says Col. Ally Smith, CYBERCOM division chief of exercise design and planning. “That puts us out in front of what our adversaries may want to do.”
By Brad D. WilliamsSen. Warner’s draft legislation, long expected, marks one of the first attempts to create a federal law mandating cyber incident reporting by some entities. Notably, the bill provides reporting entities with a degree of privacy and legal protection.
By Brad D. Williams“The more we wait, the more vulnerable we are,” a leader told the survey takers.
By Brad D. WilliamsDespite a unanimous committee voice vote, Sen. Scott announced a hold on the CISA director nominee, as well as all other DHS nominees, until President Biden visits the border with Mexico.
By Brad D. Williams“These robust information-sharing operations are just one part of our ‘defend forward’ strategy — where we see what our adversaries are doing and share that information with our partners in an effort to better bolster both our homeland defenses.”
By Brad D. Williams