Under a joint pilot program, verifying the security of mobile application software for use within the federal government no longer needs to be time consuming or expensive. The Department of Homeland Security (DHS), working with a partnership within the NSA, automated the process to determine if apps meet the agency’s National Information Assurance Partnership (NIAP) protection profile.
Ten states and Washington, D.C., held primaries on June 2 as part of this year’s presidential and local election cycle. Along with other federal stakeholders, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, known as CISA, has the role of helping to protect American’s confidence in the voting process by providing cybersecurity and a secure voting infrastructure.
On May 6, the Senate Armed Services Committee held a hearing, “Department of Defense Spectrum Policy and the Impact of the Federal Communication Commission’s (FCC’s) Ligado Decision on National Security,” to discuss the security risks of the FCC granting the company a license modification to commence terrestrial wireless operations. Taking that action presents a great risk to the military’s Global Positioning System (GPS) operations, now run by the U.S.
The success of the new Cybersecurity Maturity Model Certification (CMMC) will hinge largely on diverse types of contractors sharing information and following security standards, said a panel of experts exploring CMMC ramifications. Speaking at AFCEA’s Virtual CMMC Symposium, the government officials emphasized that the CMMC will be both an opportunity and an obligation to the defense community
The coronavirus has justifiably prompted deep concerns over the security and stability of the U.S. supply chain and major portions of the critical infrastructure upon which our nation and our partner nations have become so dependent. Prompted by the shift to globalization, over time this has led to the outsourcing of many products, services and technologies that were once considered core national capabilities. Consequently, we have created dependencies and vulnerabilities that conflict with our national security. Some of these liabilities are evident in our efforts to bring the necessary resources to bear against the coronavirus.
Ensuring the sanctity of defense information goes beyond keeping secrets from the enemy: it also brings to light vulnerabilities in the supply chain. One of the key tenets of the Cybersecurity Maturity Model Certification (CMMC) is to guarantee the sanctity of the supply chain in a time when data is particularly in peril.
A keynote fireside discussion group at AFCEA’s Virtual CMMC Symposium looked at the threats posed to the supply chain in light of the COVID-19 coronavirus pandemic. Bob Kolasky, director, National Risk Management Center, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security, provided a powerful presentation in which he pulled no punches about the threat.
The Homeland Security Department’s Science and Technology (S&T) Directorate has released a review of systems it has developed and fielded and their contributions to countering the COVID-19 pandemic.
The list includes:
SABER is a free, open-source software that enables businesses to report their operating status both during and after a disaster. Since the start of the COVID-19 outbreak, users have leveraged SABER to:
U.S. Navy engineers, some working around the clock, updated the communications and networking capabilities of the two hospital ships dispatched to U.S. ports in the fight against the COVID-19 coronavirus. The USNS Comfort and the USNS Mercy originally deployed to New York City and Los Angeles, respectively, to provide hospital services to non-coronavirus patients in an effort to relieve local hospitals burdened with COVID-19 patients. Engineers with the Naval Information Warfare Systems Command (NAVWAR) tapped expertise from throughout the command as well as from counterparts with the Defense Information Systems Agency (DISA) to improve satellite communications and increase bandwidth.
A joint advisory published today by the U.K.’s National Cyber Security Centre (NCSC) and U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) shows that a growing number of cyber criminals are exploiting the COVID-19 outbreak for their own personal gain.
Daily cyber attacks and other threats naturally take up the short-term attention of many governmental agencies, but there is a need for a more strategic look at risks to the nation’s critical infrastructure. A center within the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, or CISA, is charged with examining how to address concerns in the long-term.
A movement is underway to inspire 3D printing or other additive manufacturing experts and hobbyists to produce N95-style masks, visors and other critical medical supplies across the United States and the globe.
The so-called Maker’s Mask is a mask created by Rory Larsen at the request of Kaiser Permanente in Seattle. Larsen created the mask from commercially available hobbyist-grade 3D printers and other common household materials. He intends to share his design freely and widely.
The COVID-19 pandemic, which to date has sickened tens of thousands of Americans and killed hundreds, is testing the viability of the FirstNet network in ways never seen before. The exponential increase in the number of cases in the country is pulling in more and more emergency medical services personnel, police officers, firefighters and other public safety officials, often in more remote areas, who all need real-time data exchange, network connectivity and communication tools.
To deter attempts to disable U.S. electrical utilities and to defend nuclear weapon systems from evolving technological threats, Sandia National Laboratories has begun two multiyear initiatives to strengthen U.S. responses.
During a town hall on the response to COVID-19, leaders at the Pentagon stressed the importance of cybersecurity as more employees shift to telework. Along with personal hygiene, Daniel Walsh, acting director, Pentagon Force Protection Agency, asked Pentagon personnel to practice good cyber hygiene.
Essye Miller, principal deputy, Department of Defense Chief Information Officer, echoed similar sentiments. “With the increased telework capability comes an increased attack surface for our adversaries. They are already taking advantage,” she said.
It’s easy to forget that in the midst of a catastrophe, physical safety isn’t the only thing that’s important. As technology’s role in disaster response and relief becomes more and more prevalent, cybersecurity becomes an essential part of the process. Here’s why.
Few people are more vulnerable than those impacted by a crisis. Whether a man-made attack or a natural disaster, the widespread destruction created by a large-scale emergency can leave countless individuals both destitute and in need of medical attention. Protecting these men, women and children requires more than a coordinated emergency response.
The United States is woefully underprepared to protect cyberspace against the worst-case scenarios threatening the country, says the former supreme allied commander of NATO. Adm. James Stavridis, USN (Ret.), operating executive for the Carlyle Group, warns that long-term solutions must be paired with near-term actions to prevent a host of cyber threats from crippling the United States militarily and economically.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) selected four new industry partners to participate in a new wildfire sensors project with Smart City Internet of Things Innovation (SCITI) Labs.
The Department of Homeland Security (DHS) reported on January 17 that its Science and Technology (S&T) Directorate had completed the final integration of a smart city technology pilot in St. Louis as part of a program designed to enhance overall public safety and streamline operations across the city’s departments.
“This final rollout event, which included a series of tabletop exercises and operational scenarios, demonstrated how these technologies could be leveraged by first responders, emergency managers and other city officials in real-life events, such as floods, fires or earthquakes,” the DHS indicated.