“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams“We aim to convey that, ‘Hello, we are from the government, and we’re here to help’ is not a scary idea,” the general joked, alluding to a famous quote by former President Reagan.
By Brad D. WilliamsThe Taliban now faces a decision: Ban the internet as the group did during its first rule, while hindering its propaganda windfall and other online activities, or leave the country’s networks intact, allowing an avenue for continued US electronic surveillance.
By Brad D. WilliamsThe Exchange campaign attribution will also provide hints about the role of the first national cyber director in such incidents. NSA veteran Chris Inglis was confirmed for the position just weeks ago.
By Brad D. Williams“We’re not in Kansas anymore,” Gen. Nakasone said about the cyber threat landscape and the US’s adversaries.
By Brad D. Williams“We can design any scenario we want to create,” says Col. Ally Smith, CYBERCOM division chief of exercise design and planning. “That puts us out in front of what our adversaries may want to do.”
By Brad D. Williams“These robust information-sharing operations are just one part of our ‘defend forward’ strategy — where we see what our adversaries are doing and share that information with our partners in an effort to better bolster both our homeland defenses.”
By Brad D. Williams“Someone told me I was like Chicken Little, but I prefer Paul Revere,” said Sen. King, who co-chaired the commission that recommended creating the national cyber director.
By Brad D. WilliamsThe single biggest increase in proposed year-over-year cyber funding appears to be for cryptology, and the budget includes a new line item for zero-trust architectures.
By Brad D. WilliamsThe budget requests funding for four new teams for the Cyber Mission Force. Those teams will support CYBERCOM operations and provide cyber support for space operations.
By Brad D. WilliamsThe Ransomware Task Force report, a comprehensive effort on this topic, includes 48 recommendations to tackle this growing threat.
By Brad D. Williams“That was a list of about as many awful things in 10 minutes as I may have heard in recent time,” Sen. Mark Warner said of the DNI’s threat assessment. Top of mind: China, cyber, and emerging tech.
By Brad D. Williams“We should understand what our adversaries are doing,” Gen. Nakasone told Congress. “They are no longer launching attacks from different parts in the world. They understand that they can come into the US, use our infrastructure, and there’s a blind spot for us not being able to see them.”
By Brad D. WilliamsThree experts gave us exclusive in-depth insights into the administration’s potential menu of retaliatory options, along with U.S. cyber strategic, policy, and operations considerations.
By Brad D. Williams