“The Defense Department’s inconsistent security practices leave technical data about the nation’s missile defense system vulnerable to inside and outside threats, according to the agency auditor. The ballistic missile defense system is designed to detect and intercept incoming missiles before ...
Posts Tagged: Department of Defense
The DoD has been seeking white papers from vendors with plans for cloud-based systems that would effectively permit continued use of necessary internet connectivity but cut off public web access in a way that closes doors on most access points for hackers. Through the proposed system, all browsing w...
“Homeland Security Secretary Kirstjen Nielsen and Defense Secretary Jim Mattis spearheaded an agreement signed last week about how their agencies will work together on future cybersecurity challenges, Homeland Security Undersecretary Chris Krebs said last week. The pair is also urging more cyber c...
The Department of Defense has released its first new cyber strategy document since 2015. The document affirms that the U.S. “cannot afford inaction,” and that U.S. cyber operations must more “amplify military lethality and effectiveness” more offensively. Defense officials conducted a review...
A group of Australian researchers published a paper on how swipes, taps, key strokes, and handwriting on touch screen devices can be used to identify individuals. “While regular tracking tracks virtual identities such as online profiles, touch-based tracking has the potential to track and identify...
Although it has not included a deadline, Congress has proposed high-level exercise led by the DoD in cooperation with the DHS and FBI to prepare civilian agencies to respond to attacks on critical infrastructure. Responding to lawmakers’ claims that the DoD has not adequately prepared, DOD’s CYB...
The Chairman of the Joint Chiefs of Staff has offered to assist in the securing of the U.S.’s election systems for the upcoming midterm elections in November, according to a tweet from a U.S. senator on the Armed Services Committee. A Pentagon spokesperson has also announced that the DoD continues...
The appearance of sensitive documents detailing UAV plans and a variety of army manuals have highlighted ongoing cyber-related difficulties within the U.S. military. The plans were accessed through a router vulnerability that had been disclosed two years previously, through the computer of a Air For...