The commander of the nation’s top cyber security agencies — the National Security Agency and the U.S. Cyber Command — will not confirm that he has recommended the two agencies split from one another next year.
Maj. Gen. John Morrison, the commander of the Cyber Center of Excellence at Fort Gordon, Georgia, said the base has a lot of change right now.
The Army and Navy have begun releasing these Cyber Mission Forces (CMF) into the wilds of their network protection efforts.
Heather Kuldell, managing editor at Nextgov, joins host Derrick Dortch on this week’s Fed Access to talk about the U.S. Cyber Command, and what a change in leadership this year will mean for the organization.
The Coast Guard’s Cyber Command has to balance its identity as a military service with its role as a component of the Homeland Security Department.
Adm. Mike Rogers, commander of U.S. Cyber Command and director of the National Security Agency, told Congress that increased investments in cybersecurity are a reflection of the world we live in, responding to Representatives concerned about rising budget deficits and potential future cuts to DoD.
The commander of US Cyber Command says he wants to create an effective early warning system for cyberspace – potentially ringing alarm bells when foreign adversaries are preparing attacks on government, or even private networks. But to do it, he says he needs more voluntary sharing of cyber threat information between the federal government and commercial companies. More from Federal News Radio’s DoD reporter Jared Serbu.
The Director of National Intelligence is the first administration official to publicly attribute the OPM breach to China, and says intelligence agencies would have engaged in similar operations if given the opportunity.
The Senate packed a lot into its version of the 2016 Defense authorization bill before final passage Thursday afternoon, and in a notable break from recent history, the full package passed well before the start of the new fiscal year.
The Pentagon led the way for the rest of the government by implementing two-factor authentication across many of its systems. But plenty of important IT infrastructure still relies on a “reckless” system that depends on passwords alone for authentication.