Charting a Course to Ensure Security in the Stars


Cybersecurity plans need to encompass physical and virtual assets located on earth as well as those orbiting the earth. The cyber universe extends into the actual universe with satellites, weapons systems, and exploratory vehicles and devices all connecting to terrestrial networks. Protecting those endpoints and the IT paths in between is critical. A
Russian attack on the Viasat satellite constellation knocked out communications across Ukraine on the eve of an invasion and serves as a high-stakes example of how much we rely on space-based objects for basic communication.

The U.S. Space Force and NASA are working to harden and protect the IT between earth and space, but are facing the same issues as other agencies in terms of the cybersecurity skills gap. There simply are not enough trained people to complete all the work that needs to be done to secure the vast network these organizations oversee. To bridge this gap, space agencies are finding new ways to meet the cyber needs of the nation, and the universe. Continue reading

Staying Ahead of the Bad Guys: Investing in Cybersecurity

Agencies are challenged to move more and more services online, become more transparent, and leverage new streams of data from the Internet of Things (IoT) for better decision making, all while securing the systems and the data they hold. If that is not challenging enough, cyber threats against all of these efforts are continually evolving. A series of strategies and ongoing guidance are helping agencies prioritize work and budget requests to make the most impactful investments in their cybersecurity infrastructure.

The National Cybersecurity Strategy (NCS) provides broad guidance to help position the United States to build a digital ecosystem that is more easily and inherently defensible, resilient, and aligned with its values. Efforts to do so are organized around five pillars:

1) Defend Critical Infrastructure

2) Disrupt and Dismantle Threat Actors

3) Shape Market Forces to Drive Security and Resilience

4) Invest in a Resilient Future

5) Forge International Partnerships to Pursue Shared Goals Continue reading

Understanding the Technology Modernization Fund

The Technology Modernization Fund (TMF) was created by the Modernizing Government Technology Act of 2017 to more quickly fund needed modernization projects across government. With TMF, agencies can apply for funding to complete modernization activities without having to wait for the budget cycle to begin work on critical digital initiatives. Funding is incremental to ensure projects are working as expected.

Agencies must repay the investment either using the cost savings achieved with the tech implementation or through future budget allocations. The model is working. Of the 11 initial projects to receive TMF funding, two agencies have already reimbursed the fund, and five others have completed their projects and are in the process of reimbursement.

Continue reading

Facing the Future of Biometrics

With many of us using our faces to "open" our phones, biometric technology has become an everyday consumer technology. Capitalizing on the comfort and ease of use of facial recognition, government agencies are looking to incorporate it (and other biometric methods) into their modern cybersecurity plans and approaches but are realizing implementation in a government setting raises a host of complications.

Interest in facial recognition is strong

The U.S. Government Accountability Office (GAO) released a report in August of 2021 that detailed current and planned use of facial recognition technology by federal agencies. In a survey of 24 departments and agencies it found that 18 reported using the technology and 10 reported plans to expand their use of it. Continue reading

Cloud Is No Longer the Exception, but the Rule

Remote work, necessitated by the pandemic, accelerated many agencies' move to cloud computing. With remote and dispersed teams here to stay, cloud is a critical, if not primary, infrastructure for a number of organizations. With this wide reliance on cloud, the Cybersecurity and Infrastructure Security Agency (CISA) has been releasing Trusted Internet Connections 3.0 Use Cases, which give federal agencies guidance on applying network and multi-boundary security for remote users.

Similarly, the Defense Information Systems Agency (DISA) recently combined its Cloud Computing Program Office (CCPO) with its services directorate and ecosystem. This move, creating the Hosting and Compute Center (HaCC), recognizes the long-term reality of cloud and the role it plays in delivering services and powering everyday work for the agency. The HaCC will be "responsible for providing the warfighter with critical hosting and compute functions using modern data center and cloud capabilities." This functionality supports a number of Defense Department initiatives including Joint All Domain Command and Control. Continue reading