Neil Chatterjee will take over as chair of the Federal Energy Regulatory Commission, after Kevin McIntyre announced he was stepping down due to a “health setback.”
The Defense Department’s vulnerability disclosure policy lets anyone in the world report security holes they find in the DoD system without fear of prosecution.
White hat hackers discovered 207 verified vulnerabilities in Air Force systems, including some very serious ones.
In this week’s edition of On DoD, Peter Kim, the Air Force’s chief technology officer, Alex Rice, the CTO at HackerOne, and Reina Staley, the chief of staff of the Defense Digital Service join is to talk about the latest of DoD’s bug bounties: Hack the Air Force. We’ll also talk about changes in how the Army buys cloud computing services as part of a broader effort to shut down expensive, government-owned data centers.
The Defense Department has carved a bug bounty path that civilian agencies can follow on their own, as long as they don’t try to compare their results to the same level as DoD.
In November, when Army officials decided to launch the service’s first-ever bug bounty, one of the key questions they wanted to answer was whether sensitive personnel records were vulnerable to theft by hackers via the…
When Army officials decided to launch the service’s first-ever bug bounty, one of the key questions they wanted to answer was whether sensitive personnel records were vulnerable to theft by hackers via the Army’s public-facing websites. As it turns out, the answer was yes.
Under a $2 million contract, Synack Government will use ethical hackers for penetration testing of IRS cybersecurity systems.
The Defense Department undertook a significant expansion of its new crowdsourced approach to cybersecurity Monday, opening its “Hack the Pentagon” challenge to literally anyone and providing them a legal route to report any security holes they find.