:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/GTEUDWH56JAEPE3NVL3MWEG3FQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/GTEUDWH56JAEPE3NVL3MWEG3FQ.jpg)
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/5E6M3LMKLJEOZDXEVT42FG4KEM.jpg)
Pentagon reminds everyone not to wipe their phones
The Defense Department is responding to revelations that senior officials' phone records were deleted following the Jan. 6 attack on the Capitol.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/E3NEV2MBMRFTRKCV5YYRV7NYVE.jpg)
Cyber
US, Ukraine agree to more cyber cooperation amid Russian threat
Russia’s latest invasion of Ukraine, launched Feb. 24, was preceded by cyberattacks, including one on Viasat, a California-based company involved in commercial and military markets worldwide.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/CHW555QBD5GM3KGWQ2VP24UWU4.jpg)
Pentagon’s secret communications network to get upgrade from Booz Allen
“DISA has made clear that we will not forget that the ‘fight’ is fought on SIPRNet,” said Christopher Barnhurst, the agency’s deputy director.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/XFSKRLRXYNE73NPQNSVGEWMMNI.jpg)
Mission Possible: Securing remote access for classified networks
The Federal government understands the significance of remote access on meeting mission objectives now and in the future. Agency leaders are looking to the private sector for technology that helps them maintain the highest security levels while meeting the ease-of-access demands of today’s worker – and can be implemented quickly.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/3DQ225KJBJGGLI7XK5BYBZ3GKE.jpg)
Cybersecurity for critical infrastructure approved in $840 billion defense bill
“In the nearly 22 years that I’ve served in Congress, we have come a long way in cyberspace,” said Rep. Jim Langevin, D-R.I.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/DE4MXDASJ5BDHFL3RAF3NVF3VU.jpg)
Network Security
Troops’ use of TikTok may be national security threat, FCC commissioner says
A U.S. regulator says troops' and families' use of TikTok on personal devices could pose a national security threat.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/Y2JN2VVRMJBXZFNZBK5QLISQIQ.png)
Lockheed nabs $59 million order for Stryker cyber, electronic warfare suite
Officials have said the Terrestrial Layer System-Brigade Combat Team program will help defeat threats on an increasingly digital battlefield.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/AHXPF3A5VVDSTF3T74RPAV34XM.jpg)
UN stresses strategic communications to combat disinformation ‘weapon of war’
U.N. Secretary-General Antonio Guterres told the council that the world in which peacekeepers operate "is more hazardous today than any time in recent memory," with geopolitical tensions reverberating locally and conflicts "more complex and multi-layered."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/5JUXF35DUFFJVKCHWQJP25ZDKY.jpg)
Booz Allen unveils $100M venture capital fund to back tech startups
Booz Allen hopes to fund four to six emerging firms each year with its new venture capital fund, and reinvest money raised from those investments in future companies.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/2QHAUNJQUVA2NFTJ7WTJCMTW3M.jpg)
BAE Systems delivers new M-code GPS receivers to Germany under first non-US sale
Berlin placed the order for an undisclosed number of receivers in 2020 as a Foreign Military Sale (FMS) fulfilled through U.S. Space Systems Command (SSC).
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/EY7CWRKZ2ZCE5IFOFPMG5BKR7A.jpg)
Cyber Yankee exercise hones New England Guard skills to fight digital threats
“Whether it’s a state or a federal effort, the importance of being prepared to respond to a cyber incident is paramount.”
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/7BUIGZDEMFA73KCGJPYRE5B2RQ.jpg)
Network Security
NATO forging cyber response force amid growing Russian, Chinese threats
The U.S. will “offer robust national capabilities” to support the initiative, which is using lessons learned from the Russia-Ukraine war to tailor its methods.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/XDNI2USP2RAFDIJWLHTBGRUYJM.jpg)
Marine Corps unveils information guidance as US rivals spew propaganda
“Information is key to gaining advantage in all domains, whether during kinetic actions on the battlefield or during day-to-day operations in competition,” said Gen. David Berger, the Marine Corps commandant.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/WYTZDYL6JVBLZLDAV462UR3WVI.jpg)
National Guardsmen may soon use personal electronics in deployments
“Bring Your Own Approved Device” initiative would allow guardsmen to use personal mobile equipment to perform the same functions in the field that they would otherwise carry out at a desktop in their offices.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/ELSSP26DG5HJDNRFY54UUJBVDU.jpg)
Kennedy confirmed as Air Force cyber boss
Air Force Maj. Gen. Kevin Kennedy was approved by voice vote on June 23 to lead the 16th Air Force (Air Forces Cyber) and receive his third star.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/C5OKFYT6FNCF7FP245DDNUFPMY.jpg)
US must prepare for proliferation of cyber warfare
To build cyber resilience in this heightened threat environment, agencies must work closely with both international counterparts and industry to align on a proactive, global approach to all cyber threats –– not just state-sponsored attacks.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/Z77ARCCOGNCIVGXTPHBLZOICLU.jpg)
What the Cyber Workforce bill means for federal IT professionals
President Biden signed the Federal Rotational Cyber Workforce Program Act into law, offering agencies a practical solution to the cyber staffing crisis—if they act proactively.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/WXVIJLL7IBHTZAHBV5NQLHTO4Y.jpg)
How the cloud saved Ukraine’s data from Russian attacks
Russian operatives conducted physical and virtual “wiper attacks” on computer networks in Ukraine - attempting to delete all stored government information. Yet the data survived.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/BANK3JKEZZBIRGRK5JZQ3CETTY.jpg)
Russia hasn't launched brazen cyberattacks yet—but it might
"We have to keep our shields up," said Neal Higgins, the deputy national cyber director for national cybersecurity. "We can’t let our guard down."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/AE24R32PUBG4NKU46CLJ3ETMY4.jpg)
Zero Trust in Zero Gravity: US must commit to stay ahead of rivals in space
The U.S. must pivot towards a comprehensive cybersecurity plan immediately, the first step of which is to implement Zero Trust architectures (ZTA) across networks, and at the data level where possible, SpiderOak Inc. Executive Chairman Charles Beames says.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/O6EAMQHAZND2LBZI5ZGBTZHNVI.jpg)
Senators seek boosts for JADC2, cyber mission, hypersonics in defense bill
The Senate Armed Services Committee on June 16 published its summary of the annual defense bill, tackling everything from future network development to supply chain challenges, electronic warfare integration to hypersonic weapons development.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/QIC2W5P4MVEKTMQHKVFXQ64V44.jpg)
US Army to double cyber corps strength as focus shifts from counterinsurgency
"We're on a multiyear growth pattern," said Army Lt. Gen. John Morrison. "But we're in a pretty good spot right now."
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/FIEXHGSJQNHRHGGCRM2SMGUIGM.jpeg)
Palantir’s Karp is first western CEO to visit Zelenskyy amid invasion
“We are actively working not only on the digital blockade of the Russian Federation, but also to attract top international companies to Ukraine,” a Ukrainian minister said. “This is one of our priorities today.”
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/5H273YSWZBFKHJ5MBMOPKEDS5I.jpg)
To maximize cybersecurity dollars, lean on Zero Trust
Getting quickly to a Zero Trust architecture is more important than ever. Implementing C2C is a means available now to continuously identify and control access for all endpoints connecting to the network, making a comprehensive Zero Trust architecture achievable.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/QWMXS4YUPNFXZIEFTP5HT6O45I.jpg)
Air Force’s Haugh confirmed as US Cyber Command deputy
In 2019, he said the U.S. was “engaged in power competition with adversaries in all domains today,” further describing intelligence as “the fuel that commanders require to maneuver in response.”
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/W4DX2WH7ENELBJWZG2BP3BECI4.jpg)
Marine Corps seeks ‘information command’ in Force Design 2030 update
“We believe that in a conflict with a peer adversary, first moves may be in space and cyber, so we must enable our” forces “to integrate with, and have access to, those capabilities now,” reads the update.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/mco/OZ5XSCSRSJFCXNQ6MWUBB6LMO4.jpg)