The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.
SIGNAL Online Exclusives
In what has become one of the White House’s highest priorities, the federal government is forming digital services teams to address the mounting number of cybersecurity breaches threatening the nation’s security and coffers, according to government’s top chief information officer.
The DSCOVR satellite today reached its orbit position 1 million miles from Earth, little more than 100 days after its winter launch. The National Oceanic and Atmospheric Administration satellite will become the first operational spacecraft in deep space to provide constant weather analysis.
The U.S. government is just as vulnerable to cyberthreats—if not more so—compared to two years ago, according to a new survey of federal information security professionals. Nearly half of approximately 1,800 respondents indicated that security has not improved in the federal space, while another 17 percent stated their organization’s security posture is actually worse off.
The Finding Individuals for Disaster and Emergency Response device lived up to its name in Nepal, detecting signs of life that led to the rescue of four men trapped under as much as 10 feet of bricks, mud and other debris following the devastating April 25 earthquake in the area.
Imagery captured from UAVs can be up to 10 times less expensive than from manned aircraft or satellites, prompting government agencies and private farmers alike to investigate using the economical method. But piecing the puzzle hasn't always produced a workable solution.
Government and academia researchers made a revolutionary breakthrough in the field of thermal energy, placing scientists on a path toward the development of technology that can both harness and store energy from heat.
The Pentagon’s new cybersecurity strategy for the first time publicly addresses the department’s option to resort to offensive cyberwarfare tactics as a means to safeguard the military’s information networks. The Department of Defense Cyber Strategy, the second in four years, guides the development of the military’s cyber forces.
Modern commercial airliners could be at risk of in-flight cybersecurity attacks through a vulnerability posed by passengers using planes’ wireless systems, warns a federal watchdog agency.
The U.S. intelligence community's leading edge in the information-age technology race, particularly in the intelligence, surveillance and reconnaissance domain, has put the Defense Department at a self-imposed disadvantage, marked by some warfighters behind the curve when it comes time to process and analyze the vast amount of information collected.
On the same day that news headlines implicated Russian hackers in a significant cyber attack and breach on the White House, officials attending a cybersecurity summit Tuesday in the nation’s capital warned of the uptick in the number of nation state-sponsored cyber attacks against the U.S. government and businesses.
The notion of nefarious scientists re-engineering the genetics of living organisms to then weaponize their new specimens has some researchers jostling for the upper hand, including those at the U.S. Defense Department’s main research agency.
Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body.
It will not be long before adversaries narrow the superiority gap the United States holds over others in satellite technology. Rivals are unencumbered by bureaucratic stagnation and can rapidly leverage commercial technology for military use, according to one panelist speaking at the Satellite 2015 symposium in Washington D.C.
The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.
The U.S. government-backed cybersecurity framework for the nation’s federal agencies and critical infrastructure sector—released one year ago today—has received a general thumbs up of approval from industry experts, who say the NIST guideline is proving a successful advent toward a better understanding of cyber risks and organizations’ vulnerabilities.
Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.
The U.S. is falling behind potential adversaries, such as China and Russia, in key technological areas, warned Frank Kendall, undersecretary of defense for acquisition, technology and logistics, while testifying before the House Armed Services Committee.
President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough.
The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.