

“They’re not going to be motivated to stop,” David Frederick, assistant deputy director for China at NSA, said of the Volt Typhoon hacking group.
By Carley Welch
The Cyber National Mission Force’s commander “has that team of expertise as a tool that when she’s got a hard problem, she can use that task force as one of the solutions.”
By Carley Welch
NSA chief announces new AI Security Center, ‘focal point’ for AI use by government, defense industry
“We must build a robust understanding of AI vulnerabilities, foreign intelligence threats to these AI systems and ways to counter the threat in order to have AI security,” Gen. Paul Nakasone said. “We must also ensure that malicious foreign actors can’t steal America’s innovative AI capabilities to do so.”
By Jaspreet Gill
The nomination comes as Gen. Paul Nakasone plans to step down after leading both agencies for five years.
By Jaspreet Gill
“You don’t want to be starting that planning the week before an invasion, when you’re starting to see the White House saying it’s coming,” said NSA’s Rob Joyce. “You want to be doing that now.”
By Sydney J. Freedberg Jr.
Modernizing cryptographic systems is a lot more complicated than a software patch or iOS update, and oftentimes unfunded, but is vital to securing the nation’s most important secrets.
By Breaking Defense
The memorandum pushes agencies to adopt zero-trust architecture implementation plans, cloud technologies, multifactor authentication and encryption.
By Jaspreet Gill
VMware’s Tom Kellermann linked increasingly aggressive attacks to geopolitical tensions with Russia and Belarus.
By Brad D. Williams
Data protection solutions are key to the JADC2 goal of an interconnected tactical network that enables the sharing of sensor data among all military branches in every domain.
By Breaking Defense
The GAO decision sustained a protest from Microsoft, saying the agency’s evaluation was partly “unreasonable.”
By Andrew Eversden
“So I think [the concept of integration is] so simple and yet so hard to achieve,” Northrop VP Walsmith said. “You need to be able to integrate applications, whether they’re your own or someone else’s, with ease and simplicity. It is easy to say. It’s very hard to engineer.”
By Brad D. Williams
“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams
“In terms of weapons systems, we have computers on wings, at sea, and on land. We don’t think of [weapons systems] that way, but none of them work without computers,” NSA’s Joyce said.
By Brad D. Williams
“We aim to convey that, ‘Hello, we are from the government, and we’re here to help’ is not a scary idea,” the general joked, alluding to a famous quote by former President Reagan.
By Brad D. Williams