#interior-defense

[ follow ]
#cybersecurity
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Higher education
fromNextgov.com
8 hours ago

CISA cancels CyberCorps summer internship hiring amid DHS shutdown

CISA reversed its decision to onboard summer interns due to a funding lapse in the Department of Homeland Security.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
#ai
Information security
fromSecurityWeek
15 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
fromFortune
3 days ago
Artificial intelligence

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromNextgov.com
6 days ago

Anthropic's Glasswing initiative raises questions for US cyber operations

Anthropic is prioritizing cybersecurity by withholding a powerful AI model and launching Project Glasswing to enhance defenses against AI-driven attacks.
Information security
fromSecurityWeek
15 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Artificial intelligence
fromFortune
3 days ago

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

AI companies face challenges in balancing technology use with government secrecy, highlighted by Anthropic's conflict with the Pentagon.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromNextgov.com
6 days ago

Anthropic's Glasswing initiative raises questions for US cyber operations

Anthropic is prioritizing cybersecurity by withholding a powerful AI model and launching Project Glasswing to enhance defenses against AI-driven attacks.
World politics
fromThe Atlantic
16 hours ago

How Should the U.S. Military Fight?

General McChrystal's directive for restraint in Afghanistan aimed to win local support and avoid civilian casualties, despite pushback from frontline troops.
#national-security
World politics
fromThe Cipher Brief
3 weeks ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
World politics
fromThe Cipher Brief
3 weeks ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
UK politics
fromComputerWeekly.com
19 hours ago

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
Marketing
fromEntrepreneur
1 day ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
Europe news
fromwww.businessinsider.com
23 hours ago

The West is preparing for cheap drone attacks, but many businesses and civilians can only watch, not stop them

Civilian and corporate organizations struggle to counter small drone threats due to legal restrictions, leading to increased demand for drone detection devices.
SF politics
fromThe Cipher Brief
13 hours ago

The Navy is changing the way it does business and its still pretty pricey

The USS Boise has been inactivated to reallocate resources towards new submarine classes and improve fleet readiness.
NYC parents
fromMail Online
2 days ago

NYPD cop's sleeper cell' warning as NYC teen bombers are indicted

Americans in major cities should remain vigilant against potential sleeper cell attacks following recent terror incidents.
Books
fromwww.theguardian.com
1 day ago

Can you solve it? Are you smarter than a Navy admiral?

Tanya Khovanova's book features innovative puzzles and challenges in recreational mathematics.
fromIndependent
1 day ago

Counter-terror unit probing threat to bomb a garda station if officers 'get heavy handed' with protesters

A bomb threat was sent to Garda Headquarters, warning that a device would be detonated near a garda station if authorities acted heavily against fuel protesters.
Germany news
#us-military
Right-wing politics
fromTruthout
1 day ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
US news
fromNextgov.com
6 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
SF politics
fromFast Company
2 days ago

The Pentagon is doubling down on laser weapons research

The U.S. military plans to invest over $2 billion in directed energy weapons research for fiscal year 2027.
Right-wing politics
fromTruthout
1 day ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
US news
fromNextgov.com
6 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
SF politics
fromFast Company
2 days ago

The Pentagon is doubling down on laser weapons research

The U.S. military plans to invest over $2 billion in directed energy weapons research for fiscal year 2027.
#us-army
DevOps
fromwww.businessinsider.com
4 days ago

The US Army is test-driving a new hotline for soldiers overwhelmed with too much data both in and out of combat

The US Army Data Operations Center aims to enhance data management and support soldiers with data-related issues during a transformative phase.
DevOps
fromwww.businessinsider.com
4 days ago

The US Army is test-driving a new hotline for soldiers overwhelmed with too much data both in and out of combat

The US Army Data Operations Center aims to enhance data management and support soldiers with data-related issues during a transformative phase.
Philosophy
fromPsychology Today
1 day ago

When Leaders Go to War, Their Psychology Goes With Them

Narcissistic leaders often emerge due to fragile egos, leading to decisions that prioritize self-preservation over the well-being of others.
#dhs
fromNextgov.com
1 week ago
US politics

President's budget proposes folding beleaguered DHS intelligence office into headquarters

US politics
fromNextgov.com
1 week ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
US news
fromSecuritymagazine
5 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
fromFortune
5 days ago

'This utter lack of communication and consultation flies in the face of federal law': states push against immigration detention plans | Fortune

ICE purchased a 418,000-square-foot warehouse in Surprise, Arizona, for $70 million, with plans for a processing site capable of handling 1,000 to 1,500 immigrants daily.
US politics
Education
fromSecuritymagazine
5 days ago

School's Out, But Security's Not: Preparing for K-12 Summertime Security

Summer vacation does not reduce security threats in K-12 environments; instead, the nature of risks changes significantly.
Careers
fromComputerWeekly.com
4 days ago

Businesses are paying the price for CISO burnout | Computer Weekly

Burnout among CISOs poses significant risks to businesses, driven by overwhelming responsibilities and rising cyber threats.
Business
fromFortune
4 days ago

Defense executives worry Trump's military splurge could backfire | Fortune

Concerns arise among defense executives about the sustainability and strategic priorities of Trump's proposed military spending increase.
Intellectual property law
fromComputerworld
5 days ago

US court refuses to stay Pentagon's 'supply-chain risk' blacklisting of Anthropic

The federal appeals court upheld the Pentagon's supply-chain risk designation against Anthropic, conflicting with a California court's earlier decision.
#defense-technology
Venture
from24/7 Wall St.
6 days ago

How Defense Tech Investors Are Using SHLD to Capture 21st Century Warfare Spending

Operation Absolute Resolve showcased advanced military technology, with all platforms linked to companies in the Global X Defense Tech ETF.
World politics
fromThe Cipher Brief
5 days ago

America's Drone Strategy Has a Supply Chain Problem

The U.S. defense technology ecosystem is shifting towards a model prioritizing rapid adaptation and drone technology in response to modern warfare challenges.
Venture
from24/7 Wall St.
6 days ago

How Defense Tech Investors Are Using SHLD to Capture 21st Century Warfare Spending

Operation Absolute Resolve showcased advanced military technology, with all platforms linked to companies in the Global X Defense Tech ETF.
World politics
fromThe Cipher Brief
5 days ago

America's Drone Strategy Has a Supply Chain Problem

The U.S. defense technology ecosystem is shifting towards a model prioritizing rapid adaptation and drone technology in response to modern warfare challenges.
#microsoft
fromTheregister
6 days ago
World news

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
World news
fromTheregister
6 days ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
fromwww.businessinsider.com
18 hours ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
UK politics
fromwww.theguardian.com
13 hours ago

UK's armed forces are in a sad state and they have only themselves to blame

George Robertson criticizes Keir Starmer for complacency in defense investment amid growing security threats.
fromPOLITICO
19 hours ago

GOP leaders prepare to steamroll opponents of DHS funding plan

Sen. Rick Scott insisted on spending cuts to offset the new enforcement funding, while Sen. Tommy Tuberville emphasized the need for military funding and other GOP priorities.
SF politics
Russo-Ukrainian War
fromwww.businessinsider.com
1 day ago

Why Ukraine's drone defense playbook may not fully translate for countries facing Iranian threats in the Middle East

The US and allies face a drone threat in the Middle East, requiring different defense strategies than those used in Ukraine.
fromElectronic Frontier Foundation
1 day ago

Hot Off the Press: EFF's Updated Guide to Tech at the US-Mexico Border

"The Battalion Search and Rescue always carries the Electronic Frontier Foundation's zine in our desert rig. We're finding new surveillance all the time, and without a resource like that, we wouldn't know what the hell we're looking at."
Roam Research
fromwww.mediaite.com
4 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
fromThe Cipher Brief
4 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
UK politics
fromIndependent
23 hours ago

Ministerial blame game over 'send in the Army' threat

Fianna Fáil questions Fine Gael leader for not informing about a no-confidence motion vote regarding the government's fuel crisis handling.
fromThe Cipher Brief
5 days ago

Drones Are Changing Warfare And America Isn't Ready

The U.S. has discovered that air superiority and missile defense systems designed to counter tens/hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones.
Russo-Ukrainian War
Podcast
fromSecuritymagazine
3 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
Information security
fromThe Hacker News
17 hours ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
SF politics
fromWIRED
5 days ago

Politicians Are Spending More Money on Security as They Increasingly Become Targets

Federal campaign spending on security for the 2024 election cycle exceeds five times that of the 2016 election due to rising threats against public servants.
SF politics
fromNextgov.com
2 weeks ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Information security
fromTechCrunch
1 day ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Artificial intelligence
fromEngadget
3 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Information security
fromTechRepublic
6 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
#cybersecurity-strategy
fromSecurityWeek
1 month ago
Information security

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

US politics
fromNextgov.com
1 month ago

Trump's new cyber strategy details more offensive response to cyber threats

The White House released a national cybersecurity strategy prioritizing direct adversarial response, critical infrastructure protection, and offensive cyber capabilities alongside defensive measures.
Information security
fromSecurityWeek
1 month ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromThe Hacker News
6 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
fromWIRED
2 months ago

ICE Pretends It's a Military Force. Its Tactics Would Get Real Soldiers Killed

As a veteran of the war on terror, I have spent the past year watching Immigration and Customs Enforcement officers expand their operations across the country on a heretofore unprecedented scale and with a new faux-military bearing. From equipment to weapons to tactics, ICE and other immigration enforcement bodies want to be seen as combat forces carrying out their missions.
US politics
fromNextgov.com
1 month ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
US politics
fromTheregister
2 months ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
Information security
fromThe Cipher Brief
3 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
US politics
fromWIRED
1 month ago

Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents

HSI forum members criticize ERO's paramilitary tactics, express discomfort with mass deportations, debate agent-public interactions, and complain about working conditions.
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
Information security
fromSilicon Canals
1 month ago

ITC Secure and IronNet Unite to Form Collective Defence, a New Force in Critical Infrastructure Protection Against Hybrid Warfare - Silicon Canals

Collective Defence combines ITC Secure and IronNet to protect critical infrastructure from state-sponsored and hybrid threats using AI-driven cybersecurity and collaborative threat sharing.
[ Load more ]