The National Science Foundation has made three large "Frontier" awards worth almost $20 million to support collaborative, multi-university research and education activities in the area of cybersecurity, according to an agency announcement. The awards are funded under NSF's interdisciplinary Secure and Trustworthy Cyberspace program.
The General Services Administration, working on behalf of the Homeland Security Department's continuous diagnostics and mitigation program, unveiled Aug. 12 a blanket purchase agreement for continuous monitoring as a service. CMaaS, as it's being called by GSA, will be offered as a variety of related products and services at various price points.
The nature of cyber attacks makes it likely that the threshold for triggering a military response to one will be higher than a kinetic equivalent, says Columbia national security law professor Matthew Waxman in a paper published by the Naval War College. The United States has shied away from drawing clear lines about what would provoke a kinetic self-defense response, arguing that context will matter in any evaluation.
A government website outage that lasted for hours the morning of Aug. 14 was likely caused by a failure to update a cryptographic key necessary for DNSSEC, says cybersecurity researcher Johannes Ullrich.
As Samsung developed Knox--the company's new platform security, application security and mobile device management tool--the company met reguarly with DISA. The product's development was influenced by the security requirement guide developed by DISA's field security operations team, said Orndorff while speaking Aug. 9 at the Forecast to Industry event at DISA headquarters in Ft. Meade, Md.
The Defense Information Systems Agency sees big data and analytics as key components to providing cyber situational awareness for the Defense Department's networks, said an official speaking at the Aug. 9 Forecast to Industry at DISA headquarters in Ft. Meade, Md. The agency has launched a cyber-analytic cloud environment to support the DoD called Acropolis.
Pilots testing identity solutions that follow the guiding principles of the National Strategy for Trusted Identities in Cyberspace have revealed confusion around functional roles--a problem that was initially thought to be a mere "terminology disconnect" among stakeholders.
Holding out the possibility of non-emergency technical assistance could be an incentive to drive private sector adoption of the cybersecurity framework under development by the National Institute of Standards and Technology, say the White House and the Treasury Department.
Although the Defense Department has acknowledged that future military conflicts will have a cyber component, graduate programs at military academies still lack adequate information technology and cybersecurity curriculum.
The government of China has slightly shifted its stance on cybersecurity issues from "outright denials, counter-accusations, conflating various cyber activities, rejection of laws of warfare in cyberspace, promotion of sovereign control over cyberspace, and expressions of victimization" to a new one of some willingness to talk directly with the United States about cybersecurity, says a Congressional Research Service report.