DISA Head: DoD Working To Modernize ICAM, C2, Data Use

DISA Head: DoD Working To Modernize ICAM, C2, Data Use
DISA Head: DoD Working To Modernize ICAM, C2, Data Use

“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”

Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats

Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats
Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats

“We aim to convey that, ‘Hello, we are from the government, and we’re here to help’ is not a scary idea,” the general joked, alluding to a famous quote by former President Reagan.

Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?

Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?
Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?

The Taliban now faces a decision: Ban the internet as the group did during its first rule, while hindering its propaganda windfall and other online activities, or leave the country’s networks intact, allowing an avenue for continued US electronic surveillance.

China Likely Outed Soon For Exchange Hacks

China Likely Outed Soon For Exchange Hacks
China Likely Outed Soon For Exchange Hacks

The Exchange campaign attribution will also provide hints about the role of the first national cyber director in such incidents. NSA veteran Chris Inglis was confirmed for the position just weeks ago.

‘The Future Is About Information Dominance:’ Gen. Nakasone

‘The Future Is About Information Dominance:’ Gen. Nakasone
‘The Future Is About Information Dominance:’ Gen. Nakasone

“We’re not in Kansas anymore,” Gen. Nakasone said about the cyber threat landscape and the US’s adversaries.

Cyber Flag 21-2 Showcases New CYBERCOM Training Environment

Cyber Flag 21-2 Showcases New CYBERCOM Training Environment
Cyber Flag 21-2 Showcases New CYBERCOM Training Environment

“We can design any scenario we want to create,” says Col. Ally Smith, CYBERCOM division chief of exercise design and planning. “That puts us out in front of what our adversaries may want to do.”

CYBERCOM Seeks ‘Hunt Forward’ Funding Boost

CYBERCOM Seeks ‘Hunt Forward’ Funding Boost
CYBERCOM Seeks ‘Hunt Forward’ Funding Boost

“These robust information-sharing operations are just one part of our ‘defend forward’ strategy — where we see what our adversaries are doing and share that information with our partners in an effort to better bolster both our homeland defenses.”

Sen. King Urges ‘Reimagining Conflict’ On Eve Of Cyber Nominees Hearing

Sen. King Urges ‘Reimagining Conflict’ On Eve Of Cyber Nominees Hearing
Sen. King Urges ‘Reimagining Conflict’ On Eve Of Cyber Nominees Hearing

“Someone told me I was like Chicken Little, but I prefer Paul Revere,” said Sen. King, who co-chaired the commission that recommended creating the national cyber director.

DoD Budget Requests Funding For Key Defensive Cyber Measures

DoD Budget Requests Funding For Key Defensive Cyber Measures
DoD Budget Requests Funding For Key Defensive Cyber Measures

The single biggest increase in proposed year-over-year cyber funding appears to be for cryptology, and the budget includes a new line item for zero-trust architectures.

DoD Seeks Boost For Defensive Cyber Tech In 2022 Budget

DoD Seeks Boost For Defensive Cyber Tech In 2022 Budget
DoD Seeks Boost For Defensive Cyber Tech In 2022 Budget

The budget requests funding for four new teams for the Cyber Mission Force. Those teams will support CYBERCOM operations and provide cyber support for space operations.

DHS: Ransomware Is National Security Threat

DHS: Ransomware Is National Security Threat
DHS: Ransomware Is National Security Threat

The Ransomware Task Force report, a comprehensive effort on this topic, includes 48 recommendations to tackle this growing threat.

Global Threats: FBI Launches ‘New Investigation Into China Every 10 Hours’

Global Threats: FBI Launches ‘New Investigation Into China Every 10 Hours’
Global Threats: FBI Launches ‘New Investigation Into China Every 10 Hours’

“That was a list of about as many awful things in 10 minutes as I may have heard in recent time,” Sen. Mark Warner said of the DNI’s threat assessment. Top of mind: China, cyber, and emerging tech.

Nakasone Warns Adversaries Hack Unseen In US

Nakasone Warns Adversaries Hack Unseen In US
Nakasone Warns Adversaries Hack Unseen In US

“We should understand what our adversaries are doing,” Gen. Nakasone told Congress. “They are no longer launching attacks from different parts in the world. They understand that they can come into the US, use our infrastructure, and there’s a blind spot for us not being able to see them.”

Retaliation Options: US Cyber Responses To SolarWinds, Exchange Hacks

Retaliation Options: US Cyber Responses To SolarWinds, Exchange Hacks
Retaliation Options: US Cyber Responses To SolarWinds, Exchange Hacks

Three experts gave us exclusive in-depth insights into the administration’s potential menu of retaliatory options, along with U.S. cyber strategic, policy, and operations considerations.