Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The Defense Department's vulnerability disclosure policy lets anyone in the world report security holes they find in the DoD system without fear of prosecution.
White hat hackers discovered 207 verified vulnerabilities in Air Force systems, including some very serious ones.
Cybersecurity competitions are drawing more attention from and becoming more popular with federal agencies.
Air Force cybersecurity officials worry that the rank-and-file may be too preoccupied with the nuts and bolts of compliance.
In this week's edition of On DoD, Peter Kim, the Air Force's chief technology officer, Alex Rice, the CTO at HackerOne, and Reina Staley, the chief of staff of the Defense Digital Service join is to talk about the latest of DoD's bug bounties: Hack the Air Force. We’ll also talk about changes in how the Army buys cloud computing services as part of a broader effort to shut down expensive, government-owned data centers.
The Defense Department has carved a bug bounty path that civilian agencies can follow on their own, as long as they don't try to compare their results to the same level as DoD.
Nearly two years after Congress passed the Cybersecurity Information Sharing Act, the intelligence community says it's laid the groundwork for a public-private cyber threat hub, but it's still far from the "cyber 911" that lawmakers and agencies envisioned.
The General Services Administration’s Technology Transformation Service (TTS) released a draft solicitation asking for industry input in creating a bug bounty program.
In November, when Army officials decided to launch the service’s first-ever bug bounty, one of the key questions they wanted to answer was whether sensitive personnel records were vulnerable to theft by hackers via the…
When Army officials decided to launch the service’s first-ever bug bounty, one of the key questions they wanted to answer was whether sensitive personnel records were vulnerable to theft by hackers via the Army’s public-facing websites. As it turns out, the answer was yes.
The federal government decided to put the Defense Department in charge of building a new information technology backbone to house and process all of the data involved in security clearance investigations, one that would be safer from foreign attacks.
The Defense Department undertook a significant expansion of its new crowdsourced approach to cybersecurity Monday, opening its “Hack the Pentagon” challenge to literally anyone and providing them a legal route to report any security holes they find.
DISA is trying to speed up its acquisition of collaborative video, voice and data services.
The Pentagon last week made contract awards in its promised expansion of federal government’s first-ever bug bounty — the “Hack the Pentagon” challenge which would up finding and closing 138 separate cybersecurity vulnerabilities in DoD’s public-facing websites earlier this year.