Cybersecurity

Senate Passes Bipartisan Bill to Improve IoT Cybersecurity; Rep. Robin Kelly Quoted

Rep. Robin Kelly

The Senate has voted to pass legislation seeking to establish foundational standards for internet-connected technologies acquired by the U.S. government to help ensure the security of internet of things networks. The IoT Cybersecurity Improvement Act, introduced by Rep. Robin Kelly, D-Ill., received unanimous approval in the House and was also unanimously passed in the Senate this week. 

Read More »

Bechtel Cyber Experts Join (CS)2AI as Fellows; Mike Costas, Derek Harp Quoted

Bechtel

Katie Pehrson and Charlie Givens of Bechtel have been appointed to Control System Cyber Security Association International's ((CS)2AI) fellowship program. Pehrson and Givens will provide (CS)2AI members and industry with support and expertise on complex technical challenges across industrial control systems cybersecurity. Pehrson and Givens were appointed based on their more than 25 years of combined experience in Bechtel's cybersecurity customer initiatives. 

Read More »

Sen. Ron Wyden, Rep. Lauren Underwood Introduce Federal Cybersecurity Oversight Act

Sen. Ron Wyden

Sen. Ron Wyden, D-Ore., and Rep. Lauren Underwood, D-Ill., have proposed a bill to improve oversight of federal agencies’ cybersecurity posture. “The Federal Cybersecurity Oversight Act would prevent civilian agencies from punting cybersecurity down the road indefinitely, leaving Americans' data open for attack from hackers and foreign spies," said Wyden.

Read More »

Peter Ranks: DoD Information Enterprise Office Explores Intersection of DevOps, Cybersecurity

Peter Ranks

Peter Ranks, deputy chief information officer for Information Enterprise at the Department of Defense (DoD), said his office will help DoD track its cybersecurity progress when implementing DevOps software development practices. DoD designated the program as one of its enterprise service providers for DevSecOps in May 2020 to take security measures into consideration throughout the software development process. 

Read More »

BAE Systems Expands Capabilities at Georgia Cyber Center; Peder Jungck Quoted

Peder Jungck

BAE Systems has recently signed a lease agreement at the Georgia Cyber Center, expanding its footprint in the technology marketplace. “We’re committed to supporting our customer’s mission by bringing innovative solutions that further enable mission success,” said Peder Jungck, vice president and general manager of BAE Systems Intelligence Solutions business.

Read More »

Tempered’s Bill Kalogeros: Gov’t Should Consider Zero-Trust Requirement for IoT Security

Internet of Things

Bill Kalogeros, a public sector adviser at Tempered, said adopting a zero-trust approach along with software-defined perimeter technology could help government agencies prevent unauthorized access to internet of things devices. “Whether or not the IoT Cybersecurity Improvement Act becomes law, there are other important steps agencies can take to enhance IoT security,” Kalogeros said.

Read More »

CISA Report: IT, Comms Manufacturers Need Broader Supplier Base, Alternative Delivery Models

Supply Chain

A new report from the Cybersecurity and Infrastructure Security Agency (CISA) has found that the information and communication technology (ICT) sector needs to diversify its supply chain following the COVID-19 pandemic. The ICT industrial base must include more locations beyond single-source or single-region suppliers and incorporate delivery frameworks beyond lean inventory models to prevent delays.

Read More »

PSC Report Forecasts Continued Rise in Federal AI, Cybersecurity Spending

Cybersecurity Spending

A new Professional Services Council (PSC) report projects continued rise in federal investments in cybersecurity and artificial intelligence initiatives, including robotic process automation and machine learning. The council’s report anticipates that spending on cloud platforms will remain flat, while DoD could see a 2 percent increase in its topline budgets. 

Read More »

Air Force Uses Enterprise Training Tool to Evolve Cyber Defense Approach; Lt. Col. Ken Malloy Quoted

Cyber Defense

The U.S. Air Force is using the Persistent Cyber Training Environment (PCTE) to further the development of a redesigned training concept that involves cyber protection teams. PCTE, which the U.S. Army manages on behalf of the U.S. Cyber Command and joint cyber force, works to test the new cyber tactics at the individual and CPT levels.

Read More »

USCYBERCOM Opens Integration Office for Unified C2, Analytics Platform

Unified C2

U.S. Cyber Command (USCYBERCOM) has opened a new integration office for its Unified Platform that works to consolidate cyber, data analytics and command-and-control operations as part of the Joint Cyber Warfighting Architecture (JCWA). JCWA is comprised of joint C2 systems, a sensor network, a suite of common firing technologies, cyber tools and the Persistent Cyber Training Environment.

Read More »