25 Feb 2022

Anonymous Wages War on Russia

Back in December, we provided coverage and analysis of the first meeting of the Cybersecurity & Infrastructure Security Administration (CISA) Advisory Committee.  We noted then that CISA Director Jen Easterly and Def Con Founder Jeff Moss (a CISA Advisory Committee Member) at the meeting were less concerned with collaboration with the business community and, instead, prioritized messaging and outreach to the hacker and research community.

The Russian Invasion of Ukraine has now changed everything in this calculus of how best to “ignite” and perform outreach to the community.  Here’s how.

Read More
16 Dec 2021

Future Cybersecurity Architectures: DoD’s Zero Trust Pilot Program and Native Zero Trust Design

In response to the SolarWinds Orion and Hafnium Microsoft Exchange breaches, the  U.S. Senate Committee on Armed Services, Subcommittee on Cyber, held a hearing on April 14th.  Entitled “Future Cybersecurity Architectures”.  The specific breaches were actually only the context for a larger conversation about (and a general update on) DoD implementation of the recently approved DoD Zero Trust Architecture Framework.  We take a look at this use case through the prism of “extreme sampling” and our neverending search for bleeding-edge cybersecurity architectures.

Read More
25 Apr 2015

Department of Defense Cyber Strategy April 2015

In concert with other agencies, the United States’ Department of Defense (DoD) is responsible for defending the U.S. homeland and U.S. interests from attack, including attacks that may occur in cyberspace. In a manner consistent with U.S. and international law, the Department of Defense seeks to deter attacks and defend

Read More