Author Archive

Sean D. Carberry

Sean Carberry is a former FCW staff writer who focused on defense, cybersecurity and intelligence.

Cybersecurity

On the hunt for a CAC replacement

Defense officials are making headway on identity management tools that can eventually replace the Common Access Card.

Cybersecurity

Info sharing takes a hit in nuclear breach notification

Alerts of a recent spear-phishing attack may have damaged information sharing between government and critical infrastructure owners, experts say.

Cybersecurity

DHS: 21 states' voting systems probed by Russian hackers

In some cases the hackers got inside the systems, but their tampering had no connection to vote counts, according to a Department of Homeland Security official.

Infrastructure

DISA signs on for milCloud 2.0

The nearly $500 million contract with CSRA calls for the government-run cloud to be operated by the contractor in DOD data center space.

Infrastructure

The bottleneck in DOD’s move to the cloud

Providing cloud access points as a service might speed data center consolidation, acting CIO John Zangardi suggests.

Cybersecurity

Air Force widens military bug bounty program

For its bug bounty program, the Air Force is opening some of its public websites to vetted security specialists from some from the United Kingdom, Canada, Australia and New Zealand.

Cybersecurity

Vault 7 lessons on insider threats

The WikiLeaks release of alleged CIA hacking program data shows why insider threats are still the biggest cybersecurity danger to the government and the private sector.

Infrastructure

What Trump means for government tech

As a man famously reluctant to use computers, President Donald Trump must lead a government that is ever more reliant on technology for service delivery and national security.

Cybersecurity

Army fires up bug bounty program

Following the Pentagon’s successful bug bounty program, the Army has announced its own "Hack the Army" program to tighten up security on its public-facing websites.

Cybersecurity

‘Clunky,’ low-tech voting system still vulnerable to hacks

A new report outlines a range of vulnerabilities, infiltration points and tactics that could be used to undermine credibility in an election or even manipulate the results.