Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?

Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?
Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?

The Taliban now faces a decision: Ban the internet as the group did during its first rule, while hindering its propaganda windfall and other online activities, or leave the country’s networks intact, allowing an avenue for continued US electronic surveillance.

NSA Releases Security Guidance For DoD, Contractors On Public Networks

NSA Releases Security Guidance For DoD, Contractors On Public Networks
NSA Releases Security Guidance For DoD, Contractors On Public Networks

“The risk is not merely theoretical; these malicious techniques are publicly known and in use,” NSA notes.

US, Allies, Partners Formally Attribute Exchange Hacks To China

US, Allies, Partners Formally Attribute Exchange Hacks To China
US, Allies, Partners Formally Attribute Exchange Hacks To China

“The PRC’s pattern of irresponsible behavior in cyberspace is inconsistent with its stated objective of being seen as a responsible leader in the world,” a senior administration official said on Sunday night.

US, UK Warn Of New Worldwide Russian Cyberespionage

US, UK Warn Of New Worldwide Russian Cyberespionage
US, UK Warn Of New Worldwide Russian Cyberespionage

“This is a good reminder that the GRU remains a looming threat, which is especially important given the upcoming Olympics, an event they may well attempt to disrupt,” observed John Hultquist, VP of Analysis at Mandiant Threat Intelligence.

NSA Releases D3FEND To Improve Cyber Defenses, Info Sharing

NSA Releases D3FEND To Improve Cyber Defenses, Info Sharing
NSA Releases D3FEND To Improve Cyber Defenses, Info Sharing

While ATT&CK focuses on standardizing the way cyber warriors understand and talk about offensive cyber, D3FEND focuses on common defensive measures.

NIST Releases New Language To Automate Cloud Security

NIST Releases New Language To Automate Cloud Security
NIST Releases New Language To Automate Cloud Security

OSCAL’s goal is to enable compliance and security assessments to keep pace in complex, fast-moving, ever-changing DevSecOps environments.

DoD Budget Requests Funding For Key Defensive Cyber Measures

DoD Budget Requests Funding For Key Defensive Cyber Measures
DoD Budget Requests Funding For Key Defensive Cyber Measures

The single biggest increase in proposed year-over-year cyber funding appears to be for cryptology, and the budget includes a new line item for zero-trust architectures.

Colonial Pipeline Cyberattack Follows Years of Warnings

Colonial Pipeline Cyberattack Follows Years of Warnings
Colonial Pipeline Cyberattack Follows Years of Warnings

“We are disappointed, though unsurprised, to learn of the cyberattack,” Sen. King and Rep. Gallagher said. “We can and must be better… in navigating the threats of the Age of Cyber Aggression.”

NSA Calls For Review Of Op Tech Security

NSA Calls For Review Of Op Tech Security
NSA Calls For Review Of Op Tech Security

Operational technologies, or OT, are prevalent in critical infrastructure environments. “Without direct action to harden OT networks and control systems against vulnerabilities… owners and operators will remain at indefensible levels of risk,” NSA says.

Naval Academy Champs Talk NSA’s NCX

Naval Academy Champs Talk NSA’s NCX
Naval Academy Champs Talk NSA’s NCX

The Midshipmen edged out other competitors in this year’s virtual cyber competition to bring home the prestigious trophy. “I think the structure and dynamic of our team is what makes us so effective: We are completely student run, trained, and managed,” Gallagher said.

Global Threats: FBI Launches ‘New Investigation Into China Every 10 Hours’

Global Threats: FBI Launches ‘New Investigation Into China Every 10 Hours’
Global Threats: FBI Launches ‘New Investigation Into China Every 10 Hours’

“That was a list of about as many awful things in 10 minutes as I may have heard in recent time,” Sen. Mark Warner said of the DNI’s threat assessment. Top of mind: China, cyber, and emerging tech.

Newest Cyber Warriors Vie For Top NSA Trophy

Newest Cyber Warriors Vie For Top NSA Trophy
Newest Cyber Warriors Vie For Top NSA Trophy

Teams will face a series of rigorous challenges over three days as they compete to win the prestigious NCX trophy.

NSA About To Release Unclassified 5G Security Guidance

NSA About To Release Unclassified 5G Security Guidance
NSA About To Release Unclassified 5G Security Guidance

The guidance will “outline threats and risks to 5G infrastructure,” NSA Executive Director Noble said. It’s one way NSA is “focusing our expertise in cryptography and cybersecurity to help industry and government to integrate security into all aspects of the 5G ecosystem.”

Nakasone Warns Adversaries Hack Unseen In US

Nakasone Warns Adversaries Hack Unseen In US
Nakasone Warns Adversaries Hack Unseen In US

“We should understand what our adversaries are doing,” Gen. Nakasone told Congress. “They are no longer launching attacks from different parts in the world. They understand that they can come into the US, use our infrastructure, and there’s a blind spot for us not being able to see them.”