“They’re not going to be motivated to stop,” David Frederick, assistant deputy director for China at NSA, said of the Volt Typhoon hacking group.
By Carley WelchThe Cyber National Mission Force’s commander “has that team of expertise as a tool that when she’s got a hard problem, she can use that task force as one of the solutions.”
By Carley WelchNSA chief announces new AI Security Center, ‘focal point’ for AI use by government, defense industry
“We must build a robust understanding of AI vulnerabilities, foreign intelligence threats to these AI systems and ways to counter the threat in order to have AI security,” Gen. Paul Nakasone said. “We must also ensure that malicious foreign actors can’t steal America’s innovative AI capabilities to do so.”
By Jaspreet GillThe nomination comes as Gen. Paul Nakasone plans to step down after leading both agencies for five years.
By Jaspreet Gill“You don’t want to be starting that planning the week before an invasion, when you’re starting to see the White House saying it’s coming,” said NSA’s Rob Joyce. “You want to be doing that now.”
By Sydney J. Freedberg Jr.Modernizing cryptographic systems is a lot more complicated than a software patch or iOS update, and oftentimes unfunded, but is vital to securing the nation’s most important secrets.
By Breaking DefenseThe memorandum pushes agencies to adopt zero-trust architecture implementation plans, cloud technologies, multifactor authentication and encryption.
By Jaspreet GillVMware’s Tom Kellermann linked increasingly aggressive attacks to geopolitical tensions with Russia and Belarus.
By Brad D. WilliamsData protection solutions are key to the JADC2 goal of an interconnected tactical network that enables the sharing of sensor data among all military branches in every domain.
By Breaking DefenseThe GAO decision sustained a protest from Microsoft, saying the agency’s evaluation was partly “unreasonable.”
By Andrew Eversden“So I think [the concept of integration is] so simple and yet so hard to achieve,” Northrop VP Walsmith said. “You need to be able to integrate applications, whether they’re your own or someone else’s, with ease and simplicity. It is easy to say. It’s very hard to engineer.”
By Brad D. Williams“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams“In terms of weapons systems, we have computers on wings, at sea, and on land. We don’t think of [weapons systems] that way, but none of them work without computers,” NSA’s Joyce said.
By Brad D. Williams“We aim to convey that, ‘Hello, we are from the government, and we’re here to help’ is not a scary idea,” the general joked, alluding to a famous quote by former President Reagan.
By Brad D. Williams