Category: Operations Security

Operations Security, Security

Facebook fights order to globally block accounts linked to Brazilian election meddling

August 3, 2020

Via: Tech Crunch

Facebook has branded a legal order to globally block a number of Brazilian accounts linked to the spread of political disinformation targeting the country’s 2018 election as “extreme”, claiming it poses a threat to freedom of expression outside the country. […]

Operations Security, Policy, Security, State & Local

Colorado official details plans for penetration testing of election systems

July 28, 2020

Via: StateScoop

The Colorado secretary of state’s office said Tuesday it is partnering with the security firm Synack to conduct penetration tests of its election systems ahead of the presidential vote. In an interview with StateScoop, Trevor Timmons, the chief information officer […]

Operations Security, Security

Time running out to protect US November elections

July 15, 2020

Via: CSO Online

Four years have passed since the 2016 presidential election when revelations of Russian hacking of the DNC threw political contests into turmoil. In the aftermath, the Mueller investigation, Justice Department indictments and other efforts made clear that the US election […]

Mobile Security, Operations Security, Security

It’s unconstitutional for cops to force phone unlocking, court rules

June 24, 2020

Via: ArsTechnica

Indiana’s Supreme Court has ruled that the Fifth Amendment allows a woman accused of stalking to refuse to unlock her iPhone. The court held that the Fifth Amendment’s rule against self-incrimination protected Katelin Seo from giving the police access to […]

Networking Security, Operations Security, Security

Microsoft Joins Ban on Sale of Facial Recognition Tech to Police

June 12, 2020

Via: Threat Post

Microsoft is joining Amazon and IBM when it comes to halting the sale of facial recognition technology to police departments. In a statement released Thursday by Microsoft President Brad Smith, he said the ban would stick until federal laws regulating […]

Networking Security, Operations Security, Security

Congress wants to know what commercial spyware other countries are using

June 11, 2020

Via: ZDnet

Congress wants to know which foreign governments are using commercially-available surveillance tools — commonly referred to as spyware. The US government’s new position was included in a draft of the Intelligence Authorization Act for Fiscal Year 2021, the bill that […]

Operations Security, Security

DHS executes pivot to agile, but needs better reporting metrics

June 1, 2020

Via: FCW

The Department of Homeland Security has successfully planned and made progress executing its shift to agile software development over the past four years, but needs to do a better job on reporting metrics, according to a recent audit. In a […]

Networking Security, Operations Security, Security

Fixing a critical vulnerability in our critical infrastructure

May 29, 2020

Via: FCW

It is rare that a government report offers a realistic, near-term solution to a pressing, long-standing, black swan problem. It is rarer still that such a report recommends relying on the market rather than advocating a solution that costs billions […]

Cloud Infrastructure, Infrastructure, Operations Security, Security

Cloud security: Microsoft Azure’s SGX VMs hit GA, Google’s Shielded VM is now default

April 28, 2020

Via: ZDnet

Microsoft and Google have announced updates to their respective virtual-machine (VM) instances for highly confidential information to be processed in Microsoft Azure and Google Compute Engine. Microsoft has moved its Azure DCsv2-Series VMs to general availability. The VMs feature hardware-based […]

Operations Security, Security

The federal government’s identity crisis

April 20, 2020

Via: FCW

The coronavirus outbreak has shuttered federal office buildings and sent employees to work from home. While most expect those facilities to eventually reopen, the shift to telework is changing how agencies and contractors conduct identity and access management. The decades-long […]