Defense Systems

Global fitness tracker data exposes IoT policy gap

Thanks to data from fitness trackers, jogging routes of service members are providing a virtual atlas of sensitive military installations and forward operational bases around the world.

Science & Tech

Chelsea Manning’s Campaign Website is Based in Iceland. Why?

For one thing, it’s harder for U.S. law enforcement to search. That may matter to the Wikileaks contributor-turned-U.S. Senate candidate.

Science & Tech

DHS Cyber Info Sharing Tool to Get a Reboot This Year

The goal is for organizations to use the tool to automatically block cyber threats.

Defense Systems

DISA announces new tools to manage system risk

The service product packages are designed to ease compliance with the Risk Management Framework.

Defense Systems

National defense strategy stresses need for an agile cyber force

Defense Secretary James Mattis highlighted cyber force streamlining and tech infrastructure investment as part of an unclassified summary of the national defense strategy.

Ideas

Why Are There No Cyber Arms Control Agreements?

With the emergence of a militarized cyber domain that creates the conditions for misperceptions that could lead to inadvertent conflict, why are there no cyber arms control regimes?

Defense Systems

Faster crypto is the goal of ONR research effort

Galois is creating a suite of tools that will improve the development and testing of new cryptographic algorithms.

Science & Tech

As America’s Nukes and Sensors Get More Connected, the Risk of Cyber Attack Is Growing

Future nuclear weapons will be more sophisticated and better integrated with other equipment. That has benefits and drawbacks.

Science & Tech

DHS Offers to Vet States’ Voting Systems. But Will They Ask for Help?

Some states remain wary of federal election-security assistance, but the ice is thawing, a Homeland Security official said.

Threats

The FBI Is Disrupting One-Tenth as Many Cyber Crime Rings As In 2015

The bureau missed its own goals for disruptions and dismantlements the past two years.

Defense Systems

Why your network needs a threat hunter

Proactive hunting can find core security issues much faster than traditional reactive methods and reduce workload on security analysts who must focus on fighting day-to-day fires.

Science & Tech

Iran’s Cyber War on Dissidents Could Infiltrate Your Mailbox

Tehran’s agents are busily working against the protesters — and anyone who may have contacted them from abroad.

Ideas

When the War Comes, What Should We Civilians Do?

The military can’t do it all. The US needs a national civilian emergency corps, trained and ready to help in case of the next disaster, be it cyber, nuclear, or natural.

Science & Tech

Pentagon Full Steam Ahead with Major Cloud Acquisition

Despite industry criticism, the agency clarified its aggressive cloud strategy will continue as planned.

Threats

Here’s Why the Trump Administration Called Out North Korea’s Cyberattacks

The attribution announcement made three big arguments and North Korea’s culpability was only one of them.

Threats

Kaspersky Strikes Back After US Government Ban

The Russian anti-virus company wasn’t given a meaningful opportunity to defend itself, the CEO says in legal suit.

Science & Tech

Air Force Pays Out Government’s Biggest Bug Bounty Yet

White-hat hackers and military cyber specialists teamed up for the latest Hack the Air Force program.