government protection Archives - Adaptus

According to the Mueller report, an FBI investigation revealed that in November 2016 the GRU “sent spear-phishing emails to over 120 email accounts used by Florida county officials responsible for administering the 2016 U.S. election” and malware embedded in Word documents in those emails enabled the GRU to gain access to “at least one Florida county government.”

Read More

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden. It’s a discipline of military origins that in the computer age has become vital for […]

Read More
air force

The Air Force is refining new cloud-oriented cybersecurity technologies to safeguard vulnerable data networks and strengthen defenses against increasingly sophisticated AI-enabled cyber attacks. Air Force cloud migration, designed to reduce a hardware footprint, enable broader data access and engender greater levels of combat interoperabity, is seeking to benefit from various technical upgrades to keep pace […]

Read More

An inspector general's report finds unencrypted thumb drives, classified servers without locks on them and unrepaired computer bugs going back to 1990.

Read More
blacksville shale gas site

Exercises like Liberty Eclipse demonstrate the interdependencies within our nation’s energy infrastructure. They provide critical forums for collaboration and knowledge transfer and allow public and private sector partners to examine their respective roles and responsibilities in a controlled, secured environment.

Read More

The White House and the Department of Homeland Security have finished a government wide review examining the security of federal agencies, and the results aren’t pretty. Dozens of federal agencies have cybersecurity programs that aren’t properly equipped to deal with cyber intrusions in their networks, according to a new report released by the White House […]

Read More
maturity metrics

The state's chief information security officer says the new system will provide a much more detailed and accurate view of California's IT security risk.

Read More
Cyber security pros take first peek

The White House released a charter Wednesday publicly describing the principles, aims and values of the secretive process it uses to decide what hacking tools to keep in its arsenal and which it would report to tech companies to allow them to fix.

Read More
top priorities for NIST director nominee

“My personal priority is to find better ways [of] engaging with industry and finding partnerships,” says NIST director nominee, Walter Copan. @usnistgov

Read More
cyber spying campaign

The campaign appeared to be the work of several groups, but tactics and techniques used suggest that the groups were operating with “similar goals or under the same sponsor”, probably a nation state... @cyber #cybersecurity #information

Read More