Processing....

Logo

Digital News Coverage of Government Contracting and Federal Policy Landscape
Sticky Logo
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
Logo
News
DHS Official Emphasizes Importance of Partnerships in Gov’t Cybersecurity Effort
by Jerry Petersen
Published on November 13, 2018
DHS Official Emphasizes Importance of Partnerships in Gov’t Cybersecurity Effort


DHS Official Emphasizes Importance of Partnerships in Gov't Cybersecurity EffortThe head of the Department of Homeland Security’s Continuous Diagnostics and Mitigation Program has said that the CDM team seeks to collaborate with client federal agencies to determine cybersecurity solutions appropriate to their unique organizational requirements, Federal News Network reported Wednesday.

CDM Program Manager Kevin Cox told Federal News Network in a recent interview that “we want to make sure we are working with the agencies to understand” what they need to strengthen their systems and networks against cyber threats and “in the long run meet those requirements.”

The Homeland Security official also sought to dispel the notion that the CDM seeks to foist solutions on agencies, insisting, again, upon a focus on requirements, adding that “if an agency can show those requirements, then we will take the data from that system to meet the requirement.”

Cox went on to emphasize the importance of building partnerships for the effectiveness and success of the CDM program.

The Continuous Diagnostics and Mitigation Program aims to minimize cybersecurity risks to government information networks and systems by providing requisite tools, capabilities and services.

The CDM was established by Congress.

News
Dean Boyd: Federal Gov’t Making ‘Significant Progress’ on Insider Threat
by Peter Graham
Published on November 13, 2018
Dean Boyd: Federal Gov’t Making ‘Significant Progress’ on Insider Threat


Dean Boyd: Federal Gov't Making 'Significant Progress' on Insider ThreatThe Office of the Director of National Intelligence has said efforts to combat hackers at federal agencies are paying off even with the landscape evolving since the National Insider Threat Program was established in 2011, Federal News Network reported Monday.

Nicole Ogrysko writes that the National Insider Threat Task Force believes responses to the challenge require newer methods, adaptable approaches and fresher insights.

However, Dean Boyd, spokesman for ODNI’s National Counterintelligence and Security Center, said federal agencies are already responding to threats to network security.

“The federal government as a whole has made significant progress in the past year,” Boyd told Federal News Network.

“These challenges are increasingly being addressed as formal training of insider threat personnel becomes more prevalent,” he added.

The task force on Oct. 24 released the Insider Threat Program Maturity Framework, which stipulates requirements for personnel insider threat training and monitoring employee activities and behavior.

 

News
Audit Set for November for FAA’s Drone Authorization Efforts
by Darwin McDaniel
Published on November 13, 2018
Audit Set for November for FAA’s Drone Authorization Efforts


Audit Set for November for FAA’s Drone Authorization EffortsThe Department of Transportation‘s inspector general has announced that it will conduct an audit of the Federal Aviation Administration’s role in authorizing operations of small unmanned aircraft systems in U.S. airspace.

The DOT IG said in a memo that it will begin the assessment in November at the FAA’s headquarters, at air traffic facilities and airports across the U.S.

The audit will focus on the impact of the agency’s recently-launched Low Altitude Authorization and Notification Capability for automated airspace authorizations and how the agency coordinates UAS airspace approvals and notifications between airports, FAA air traffic facilities, LAANC service suppliers and UAS operators.

The FAA launched LAANC in April in partnership with the private sector to speed up approval for use of drones in U.S. airspace. 

The move comes amid efforts of the agency to address the challenges with the growing volume of requests for UAS authorizations in controlled airspace near airports. Since December 2015, the FAA has processed over 1.1M registrations. 

“The continuing growth of UAS within the national airspace system presents challenges for the FAA in maintaining the world’s safest aviation system while fostering innovation,” said the DOT IG.

Executive Moves/News
Scientist Brian Anderson Named Director of National Energy Technology Laboratory
by Nichols Martin
Published on November 12, 2018
Scientist Brian Anderson Named Director of National Energy Technology Laboratory


Scientist Brian Anderson Named Director of National Energy Technology LaboratoryBrian Anderson, former director of West Virginia University’s Energy Institute, has joined the Department of Energy as director of the National Energy Technology Laboratory.

He succeeds Sean Plasynski, who now serves as NETL’s deputy director and chief operating officer, the DOE said Friday.

The appointment continues Anderson’s previous involvement with NETL, where he coordinated a study on methane hydrate reservoir.

Anderson founded the WVU’s Energy Institute in 2014 to foster collaborative research and development of new technologies.

The former professor also coauthored a report on enhanced geothermal systems with the Massachusetts Institute of Technology, and is a member of various science organizations including AltaRock Energy‘s technical advisory board.

News
Aspen Cybersecurity Group Sets New Principles to Secure IoT Devices
by Darwin McDaniel
Published on November 12, 2018
Aspen Cybersecurity Group Sets New Principles to Secure IoT Devices


Aspen Cybersecurity Group Sets New Principles to Secure IoT DevicesThe Aspen Cybersecurity Group has issued seven principles to bolster the security of Internet-of-Things devices, calling on manufacturers to increase investment, accountability and transparency in their products’ security, to design devices with “updateable” security and to build a multi-layered IoT defense, The Washington Post reported. 

“When left unsecured, however, these devices also carry increased risks to public health and safety, business operations and individual privacy,” the ACG said in a recently-released memo. “As the attack surface continues to expand, there is an acute need to ensure the benefits of IoT— and technological innovation more broadly — are nurtured while simultaneously mitigating against the associated risks.”

ACG’s IoT Security First Principles:

1. Manufacturers should incorporate security at the design phase of IoT devices.
2. Transparency should include details on the security attributes of products and services for the consumer’s awareness.
3. Developers should provide information on product privacy.
4. Manufacturers should be held accountable for the security of their devices.
5. IoT devices should have updateable security to keep up with changing security risks.
6. Products should have multi-layered security and countermeasures that function 
without degrading in the absence of connectivity.
7. Manufacturers should limit device features to “necessity.”

“Changing the dynamic requires an environment that incentivizes products to be secure-by-design and increases transparency to give consumers an opportunity to consider the security and privacy impacts of a product in their purchasing decisions,” the group said. 

The ACG also provided recommendations for increasing the size of the U.S. cybersecurity workforce and a framework to improve cybersecurity collaboration between the federal government and the industry.

The Aspen Institute established the group in 2017, which consists of lawmakers, former government officials, technology experts, scholars and other cybersecurity professionals.

News
State Department Looks to Trim Restrictions on ‘Sensitive’ Drone, 5G Technologies
by Darwin McDaniel
Published on November 12, 2018
State Department Looks to Trim Restrictions on ‘Sensitive’ Drone, 5G Technologies


State Department Looks to Trim Restrictions on 'Sensitive' Drone, 5G TechnologiesThe State Department has announced a plan to relax rules on the sale of some key technologies used on drones and 5G telecommunications devices, which the government currently considers as potential risks, or sensitive, to national security, Defense One reported.

The agency said it will remove some restrictions on the distribution of advanced Monolithic Microwave Integrated Circuits chips, which provide higher data rates for mobile phones, sensors and other Internet-of-Things devices. 

Under the plan, MMICs would be removed from the Defense Department’s strictly regulated U.S. Munitions List and would be transferred to the Commerce Department’s less stringent Commerce Control List. 

An unnamed State official said such advanced chips “use quite a bit less power than the ones we use in the military arena” for radar and other applications.” 

Meanwhile, the State Department is also considering relaxing rules on the sale of unmanned vehicles with anti-collision radar. 

The planned changes would mainly allow manufacturers to sell “hunter-killer drones” that can detect and disable other autonomous aerial systems. 

News
Military Seeks Bomb Disposal Technology Modernization
by Peter Graham
Published on November 12, 2018
Military Seeks Bomb Disposal Technology Modernization


Military Seeks Bomb Disposal Technology ModernizationU.S. military officials have said it is important to modernize its explosive ordnance disposal technology, National Defense reported Friday.\n

Lt. Gen. Reynold Hoover, deputy commander of the U.S. Army’s Northern Command, said aside from being prepared for counterterrorist operations against insurgents from Iraq and Afghanistan, the country’s military forces must also be ready to demonstrate their weapons capabilities to adversaries Russia and China.

Hoover said during the Global EOD Symposium and Exposition in Bethesda, Md., that enemies often infiltrate the “gray zone”, which “represents challenges and opportunities for our EOD forces that will require strong government and industry cooperation, active academic research and development, and close collaboration between military and civilian law enforcement, the intelligence community and military services”.

He added the importance of not only upgrading military hardware but also boosting troop organization and implementing changes to how warfighters gather and disseminate information.

News
Report: Military Space Programs Prioritize Ground Segment Production
by Peter Graham
Published on November 12, 2018
Report: Military Space Programs Prioritize Ground Segment Production


Report: Military Space Programs Prioritize Ground Segment ProductionMilitary space programs are prioritizing the construction of spacecraft ground segment systems to avoid instances wherein a satellite cannot perform at its optimum capacity because of insufficient ground segment capability, Space News reported Thursday.

Deanna Ryals, chief partnership officer at the Air Force Space and Missile Systems Center, said a Wideband Analysis of Alternatives study conducted by the U.S. Air Force this summer showed the need to prioritize ground system establishment for future space missions.

The Government Accountability Office identified significant ground segment delays in the GPS III and the Mobile User Objective System satellite programs.

The GPS III’s launch was rescheduled to April 2022.

Andrea Loper, space vehicles directorate acquisition program manager at the Air Force Research Laboratory, said the lab aims to have its ground segment system – which consists of user terminals, command and control platforms and network operations – support as many space missions as possible.

 

News/Press Releases
UN Committee Approves Draft Resolutions on Responsible ICT Use by State Actors
by Jerry Petersen
Published on November 12, 2018
UN Committee Approves Draft Resolutions on Responsible ICT Use by State Actors


UN Committee Approves Draft Resolutions on Responsible ICT Use by State ActorsThe United Nations General Assembly First Committee has approved two documents that aim to regulate the way state actors use modern information and communication technologies.

The Disarmament and International Security Committee approved the draft resolution titled “Developments in the Field of Information and Telecommunications in the Context of International Security,” which provides a list of “responsible behaviors of States” with regard to modern communication technologies and calls for, among other things, the creation of a working group in 2019 that would develop and expand that list, the U.N. announced in a press release.

The DISEC also approved a draft resolution titled “Advancing Responsible State Behavior in Cyberspace in the Context of International Security,” which called on signatory states to use communication technologies in ways that are consistent with principles prescribed by earlier U.N. expert panels.

In addition, the document called for the creation of a new panel that would “continue to study… possible cooperative measures to address existing and potential threats in the sphere of information security.”

News
NIST Publishes Behavioral Anomaly Detection Guide on Industrial Control Systems
by Peter Graham
Published on November 12, 2018
NIST Publishes Behavioral Anomaly Detection Guide on Industrial Control Systems


NIST Publishes Behavioral Anomaly Detection Guide on Industrial Control SystemsThe National Cybersecurity Center of Excellence, in cooperation with the National Institute of Science and Technology‘s Engineering Laboratory, has introduced a system that shows how a manufacturing firm can update the security of its industrial control systems via behavioral anomaly detection (BAD).

According to the report published this month, BAD capabilities can help prevent malware attacks and other operational data threats.

The BAD initiative was able to demonstrate threat detection processes based on three different methods: network-based, agent-based and operational historian/sensor-based.

 

Previous 1 … 1,914 1,915 1,916 1,917 1,918 … 2,600 Next
News Briefing
I'm Interested In:
Recent Posts
  • Entegris to Drive Semiconductor Innovation Through $700M R&D Investment
  • Gen. Whiting: Enhancing Space Security Requires Greater International Cooperation
  • Joseph Francescon Appointed National Security Agency Deputy Director
  • NIST Releases Draft Guide to Help Organizations Address Emerging Cybersecurity Risks
About

ExecutiveGov, published by Executive Mosaic, is a site dedicated to the news and headlines in the federal government. ExecutiveGov serves as a news source for the hot topics and issues facing federal government departments and agencies such as Gov 2.0, cybersecurity policy, health IT, green IT and national security. We also aim to spotlight various federal government employees and interview key government executives whose impact resonates beyond their agency.

Read More >>

RSS ExecutiveBiz
  • Going Deeper on the 2025 GAUGE Report: GovCons Turning to PMOs, Automation & AI
  • BAE Systems Grows Semiconductor Manufacturing Capacity in New Hampshire With CHIPS Act Funding
  • MANTECH, Oracle Team Up to Deliver AI, Cloud Offerings for Federal Modernization
  • Emergent Adds Salesforce Offerings to GSA Contract
  • GDIT’s Dave Vennergrund Discusses AI Adoption in Government to Meet Mission Needs
  • Credence Wins DLA Contract for AI-Enabled Cloud Services
RSS GovConWire
  • DHS Awards 13 Spots on Armed Protective Security Officer Services Contract
  • Gregory Davis Named DecisionPoint VP of Business Development
  • Pasteur Labs Buys Digital Platforms Developer FOSAI
  • Red River Appoints David Raffetto as Technology Solutions SVP, GM
  • Scale AI Secures $99M Army Contract for R&D Services
  • Peraton Books $100M in Government Contracts
Footer Logo

Copyright © 2025
Executive Mosaic
All Rights Reserved

  • Executive Mosaic
  • GovCon Wire
  • ExecutiveBiz
  • GovCon Exec Magazine
  • POC
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
Go toTop