Mandiant CTO: Cyber Attribution, Deterrence More Vital Than Defense

Mandiant CTO: Cyber Attribution, Deterrence More Vital Than Defense
Mandiant CTO: Cyber Attribution, Deterrence More Vital Than Defense

“We’re on the defense,” Ron Bushar, senior vice president at Mandiant says. “I don’t think we’ve hit a real deterrence level in this space yet. And that’s going to be key to thinking through our strategy over the next few years.”

US Agencies, Defense Companies Hacked Via VPNs

US Agencies, Defense Companies Hacked Via VPNs
US Agencies, Defense Companies Hacked Via VPNs

Threat actors are targeting one newly discovered and three previously known vulnerabilities in Pulse Connect Secure enterprise VPNs, according to a CISA emergency directive and alert, as well as blog posts by FireEye and Ivanti. “There is no indication the identified backdoors were introduced through a supply chain compromise of the company’s network or software deployment process,” FireEye noted.

CISA ‘Strongly Urges’ Patching As Widespread Exchange Server Hacking Continues

CISA ‘Strongly Urges’ Patching As Widespread Exchange Server Hacking Continues
CISA ‘Strongly Urges’ Patching As Widespread Exchange Server Hacking Continues

Security professionals are increasingly observing multiple threat actors, from nation-states to cryptominers, exploiting the vulnerabilities. As for China-based HAFNIUM, “This is part of the much larger Chinese effort to constantly be ferreting out new vulnerabilities and then exploiting them — with no end in sight,” said Heritage’s Dean Cheng. “The Chinese will pay close attention to the Biden administration response.”

CMMC: Stopping Cyber Espionage Like Chinese Theft of F-35 Data

CMMC: Stopping Cyber Espionage Like Chinese Theft of F-35 Data
CMMC: Stopping Cyber Espionage Like Chinese Theft of F-35 Data

CMMC 1 is “what you’ve got to have to make sure your neighbor is not in your Netflix,” quipped Stacy Bostjanick, director of CMMC. “It’s very easy, and commensurate with basic cyber hygiene. I recommend that everyone get there, but as a COTS provider, you don’t have to.”

Starting Dec. 1, Cybersecurity Is No Longer Optional

Starting Dec. 1, Cybersecurity Is No Longer Optional
Starting Dec. 1, Cybersecurity Is No Longer Optional

“This is the start of a new day in the Department of Defense where cybersecurity, as we’ve been saying for years is foundational for acquisitions, we’re putting our money where our mouth is. We mean it,” Katie Arrington says.

NSA Warns Companies China Is Exploiting 25 Unpatched Vulnerabilities

NSA Warns Companies China Is Exploiting 25 Unpatched Vulnerabilities
NSA Warns Companies China Is Exploiting 25 Unpatched Vulnerabilities

The NSA cannot mandate patching on its own, but the new Cybersecurity Maturity Model Certification (CMMC) allows the Pentagon to penalize companies in its supply chain that fail to adequately protect their networks.

Worried About Chinese Backdoors, Lord Pushes For New Tech Strategy

Worried About Chinese Backdoors, Lord Pushes For New Tech Strategy
Worried About Chinese Backdoors, Lord Pushes For New Tech Strategy

Ellen Lord said DoD is working to develop a “microelectronics strategy,” to bring manufacturing and testing to the US

US To Israel: No More Chinese Deals; Pompeo’s Flying Visit

US To Israel: No More Chinese Deals; Pompeo’s Flying Visit
US To Israel: No More Chinese Deals; Pompeo’s Flying Visit

Israeli officials said the message relayed during Secretary of State Mike Pompeo’s hours-long visit included a very specific political warning – Israel must stop any action that strengthens the Chinese Communist Party, even if that means canceling projects already planned.

Protect Your Data Or Lose DoD Business: Maj. Gen. Murphy (EXCLUSIVE)

Protect Your Data Or Lose DoD Business: Maj. Gen. Murphy (EXCLUSIVE)
Protect Your Data Or Lose DoD Business: Maj. Gen. Murphy (EXCLUSIVE)

The head of the Pentagon’s Protecting Critical Technology Task Force wants to tighten security controls. That may conflict with the push to streamline acquisition.

Can DoD Get Speed & Security With The Cloud?

Can DoD Get Speed & Security With The Cloud?
Can DoD Get Speed & Security With The Cloud?

The Pentagon is struggling to speed up acquisition at the same time it’s imposing new cybersecurity controls. But one senior official has an idea for how to do both.

Security Trumps Speed For 5G Networks: CNAS

Security Trumps Speed For 5G Networks: CNAS
Security Trumps Speed For 5G Networks: CNAS

“Security will be more important than speed in establishing a durable foundation for 5G’s future,” writes leading scholar Elsa Kania – and Washington must lead the way.

US To Press China Espionage Cases Regardless Of Trade Talks: DOJ

US To Press China Espionage Cases Regardless Of Trade Talks: DOJ
US To Press China Espionage Cases Regardless Of Trade Talks: DOJ

“We didn’t bring one of these cases because of what’s going on on the trade front,” assistant attorney general John Demers said, “and we’re not going to drop them even if we reach an agreement.”

Huawei’s 5G Gambit: Sharing Tech Won’t Fix Security

Huawei’s 5G Gambit: Sharing Tech Won’t Fix Security
Huawei’s 5G Gambit: Sharing Tech Won’t Fix Security

Huawei founder Ren Zhengfei made a dramatic offer to let all comers license and modify his 5G technology. Making it secure would be a Herculean task.

Competition (With China) IS The New Deterrence, US Military Leaders Say

Competition (With China) IS The New Deterrence, US Military Leaders Say
Competition (With China) IS The New Deterrence, US Military Leaders Say

Vice Adm. David Kriete, deputy STRATCOM commander: “Strategic deterrence is active deterrence; it’s very dynamic.”