The National Security Agency (NSA) and the Trusted Computing Group (TCG) industry consortium have come up with validation software that can be used with any device and could go a long way to securing the supply chain for computing devices. […]

Nakasone US Cyber Command

Gen. Paul Nakasone, head of U.S. Cyber Command and the National Security Agency (NSA), discussed how the recent shift in Federal cybersecurity strategies enabled a stronger response to foreign adversaries. […]

National Security Agency (NSA) Senior Adviser Rob Joyce said yesterday that any move to regulate social media platforms would have to start with quicker and more efficient connections between policy makers and policy enforcers such as the Department of Homeland Security (DHS) and the Federal Bureau of Investigation, but also warned that any effective regulation of social media platforms would be difficult to achieve in the U.S. […]

quantum computing chip ai -min

Officials from the intelligence community on Thursday discussed the importance of using artificial intelligence to process and analyze the large amount of collected data by agencies, thus freeing analysts to shift their efforts toward looking into anomalies identified by AI. […]

On Tuesday, the Office of the Inspector General (OIG) released a semi-annual report of the National Security Agency (NSA) to Congress that cited several security concerns for the agency’s technology and data. […]

The National Security Agency and Central Security Service inducted five new individuals to the NSA/CSS Hall of Honor on Nov. 28, according to a Dec. 7 NSA/CSS press release. […]

DoD Pentagon Military

The Department of Defense’s Inspector General took the agency to task in a Nov. 8 report that says four DoD components failed to fully implement the 2015 Cybersecurity Information Sharing Act (CISA) which aims to encourage sharing of cybersecurity threat data between the government and the private sector. […]

The National Security Agency published a news feature today that provides a new, NSA-developed resource for organizations looking to promote the well-being of their cybersecurity personnel. Dr. Celeste Lyn-Paul, senior researcher and technical advisor at NSA Research, and Dr. Josiah Dykstra, deputy technical director of NSA Cybersecurity Operations, developed the Cyber Operations Stress Survey (COSS) to help gauge stress levels of security personnel in high-risk environments. […]

NSA

The National Security Agency’s (NSA) Office of Inspector General (OIG) has for the first time released its semi-annual report to Congress as an unclassified document, and in the process shed light on IT deficiencies at the agency. The report, released Wednesday and covering the period of October 1, 2017 to March 31, 2018, highlights multiple audits that found numerous issues in the governance of NSA’s IT infrastructure and its subsequent ability to mitigate cybersecurity risk. […]

Leaders in the Federal intelligence community, speaking last Tuesday at Defense One’s Tech Summit, said that their agencies are using vast stores of data, machine learning, and neural networks to go beyond simple fact-finding, to now radically re-envision how the intelligence community acts on credible information. But with these advances in technology come thorny new ethical and procedural questions, those officials said. […]

The U.S. Cyber Command is ready for its close-up. The command announced May 17 that all 133 of its Cyber Mission Teams are fully operational, capping a roughly one-month stretch that saw the arrival of a new commander, the opening of a new operations center, and the official designation of Cybercom as a full unified combatant command. […]

John Bolton, President Trump’s national security adviser, may not be hunting for a replacement for Rob Joyce, the current White House cybersecurity coordinator, who previously announced he would leave his post and return to the National Security Agency later this month. […]

Army Lieutenant General Paul Nakasone is taking over this afternoon as chief of U.S. Cyber Command and director of the National Security Agency.  At the same time, U.S. Cyber Command is being elevated to the level of a full unified military command, the Defense Department said today. […]

The Air Force has awarded five small businesses contracts that could top out at $950 million for the rapid development of new cyber capabilities. This contract continues an effort by the service, and the Department of Defense overall, to keep up with potential adversaries in the fast-changing cyber domain. […]

As the deadline to renew the National Security Agency’s surveillance powers looms, proposed bills and speculations of bills drive the conversation on national security versus privacy. Senate Republicans led by Sen. Tom Cotton, R-Ark., proposed a bill in June to completely renew Section 702 of the Foreign Intelligence Surveillance Act without any changes or sunset provision. Section 702, which expires at the end of the year, allows the NSA to collect data from foreign nationals without obtaining a warrant. […]

The National Security Agency gave Columbus State University in Georgia a $174,000 grant to develop a cybersecurity training tool. “We are building a tool that people across the nation can use to develop cybersecurity training, which guarantees compliance with government and industry standards for cybersecurity workforce development,” said Shuangbao “Paul” Wang, a professor in CSU’s TSYS School of Computer Science. […]

The U.S. Cyber Command will begin to exercise its newly granted acquisition authority by the end of 2017 with its first industry day on Oct. 27. Congress gave CYBERCOM its own ability to purchase technology capabilities in order to keep up with the constantly changing nature of the cybersecurity sphere. CYBERCOM plans to hold its industry day at the Arthur Lundahl Conference Center in Springfield, Va. […]

The Government Accountability Office evaluated the advantages and disadvantages of the National Security Agency and Cyber Command’s dual-hat leadership system and found that the system causes tension between the two agencies due to competing interests. […]

The revelation that the National Security Agency conducted blanket surveillance of spectators at the 2002 Olympic Games could hurt the agency’s chances of getting its surveillance laws renewed this year. Thomas Drake, former NSA executive, submitted a formal declaration on May 25 that revealed the NSA’s program Stellar Wind, the goal of which was to “collect and store virtually all electronic communication going in or out” of the Salt Lake City area. […]

A group of prominent technology companies wrote a letter to the chairman of the House Judiciary Committee, asking Congress to reform the National Security Agency’s surveillance powers. The technology companies include Adobe, Amazon, Cisco, Google, and Microsoft. […]

Rob Joyce, cybersecurity coordinator for the White House, has the opportunity to heal tensions between the intelligence community and the technology industry in the wake of the WannaCry ransomware attack. […]

Categories