Bug Bounty

FILE - This March 27, 2008 file photo shows the Pentagon in Washington. The civilian official overseeing the Pentagon's campaign to defeat the Islamic State group in the Middle East has resigned in the latest jolt to Pentagon leadership in the waning weeks of the Trump administration.(AP Photo/Charles Dharapak, File)

Pentagon wants white hat hackers to try and penetrate all of its websites

In today’s Federal Newscast, the Defense Department has expanded its program of using external hackers to probe systems for cybersecurity vulnerability.

Read more

Air Force wants bug bounties to tackle cyber threats deep in its supply chain

Read more
In this Tuesday, Oct. 8, 2019, photo a woman types on a keyboard in New York. Cybersecurity researchers say a coordinated cyberespionage campaign has targeted U.N. relief agencies, the International Red Cross and other non-governmental organizations groups for the past 10 months. The California cybersecurity outfit Lookout says the campaign, which uses phishing to harvest passwords from mobile phones and computers, is still active. (AP Photo/Jenny Kane)

CISA partners with OMB to stand up vulnerability disclosure policies at civilian agencies

Read more
(AP Photo/Sue Ogrocki)Air Force

Air Force cloud had 54 vulnerabilities before hackers found them

Read more

Marten Mickos: Air Force bug bounty exposes 207 vulnerabilities

White hat hackers discovered 207 verified vulnerabilities in Air Force systems, including some very serious ones.

Read more

Should cyber competition performance be valued like schooling in cyber workforce?

Cybersecurity competitions are drawing more attention from and becoming more popular with federal agencies.

Read more

Air Force CISO: Cyber workers ‘crippled’ by overload of regulations

Air Force cybersecurity officials worry that the rank-and-file may be too preoccupied with the nuts and bolts of compliance.

Read more

Sign up for breaking news alerts