Science & Tech
Computers Have Found a Better Way to Spot Emailed Malware, Researchers Say
Somehow no one thought of applying machine learning to malicious email in exactly this way. But the results are big.
Ideas
What Alexander Hamilton Can Teach Us About Cyber Policy
Let’s apply the first Treasury Secretary’s principles to, say, China’s economic espionage.
Defense Systems
A new model for cyber risk management
The IBM Center for The Business of Government proposes a new risk management model that that allows agencies to tailor approaches for particular cyber challenges.
Science & Tech
Chinese Hackers Targeted Internet-of-Things in Finland During Trump-Putin Summit
A spike in attacks sought access to devices that might yield audio or visual intelligence.
Science & Tech
Pentagon Wants to Move Some Cyber Defense Operations to the Cloud
The Defense Department’s considering a cloud extension of its Acropolis system, which it describes as “where we fight” in cyberspace.
Defense Systems
Michelli outlines cybersecurity, AI strategies for DOD
The Defense Department's acting deputy CIO for cybersecurity said to expect cyber and artificial intelligence strategies in the coming weeks.
Business
If Your Weapons Aren’t Cyber-Hardened, Expect to Lose Pentagon Contracts
The Pentagon intends to start assessing its weapons’ resistance to hacks, instead of leaving that to manufacturers.
Science & Tech
Russia’s Foreign-Software Approval Service Helps Military Hackers: Report
The agency that ostensibly reviews foreign-made wares for vulnerabilities sends the lion’s share straight to its hacker squads.
Defense Systems
DOD leads the way in crowdsourced security
The adoption of bug-bounty programs in government has increased 125 percent increase year over year, according to a new report.
Defense Systems
ARCYBER brings on first direct-commissioned officers
The first successful recruits of a pilot program to commission cyber talent are getting ready to serve.
Science & Tech
China Likely Knew about Spectre and Meltdown Bugs Before the US
Fixing hardware and software vulnerabilities requires global information sharing—and that includes U.S. cyber adversaries.
Science & Tech
Hacker Caught Selling Maintenance Manuals for Military Drones
A poorly configured router allowed the theft of drone manuals, a list of maintainers, material on the Abrams tank, and more.
Threats
Tomorrow's Quantum Computers Are Already Threatening Today’s Data
Large-scale quantum computing could be just five years away.
Ideas
DHS Aims to Turn Mobile Devices into No Phishing Zones
The Homeland Security Department and 16 other agencies are upgrading their mobile device security.
Ideas
You Should Be ‘Significantly Concerned’ There’s No White House Cyber Coordinator, Policy Experts Say
They also worry we’re going the wrong way on integrating government cyber operations.
Ideas
Banning Software Won't Keep the Government Safe, Says Nuclear Security Agency Official
Rather than banning software from China or Russia, the U.S. government should focus on reducing the danger any particular app can pose.
Defense Systems
DOD, GSA, NASA move to raise purchasing ceiling for cyber emergencies
According to a proposed rule, agencies could spend more money for work directly related to supporting a contingency operation.
Ideas
Only 6 Non-Federal Groups Are Sharing Cyber Threat Data with DHS
A 2016 law intended to bolster collective cyber defense isn’t attracting private-sector participants.
Threats