Fifth Domain
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
  • Videos
  • Newsletters
  • © 2021 Sightline Media Group
  • DHS
  • FBI/DOJ
  • OMB
  • CYBERCOM
  • Air Force
  • Army
  • Marine Corps
  • Navy
  • Capitol Hill
  • Policy
  • Career
  • Education/Training
  • Opinion
  • White Papers
  • Show Reporters
  • Special Multimedia Reports
  • Insights from Raytheon

Policy

  • The DoD CIO's office gained additional cybersecurity responsibilities as part of the new National Defense Authorization Act. (gorodenkoff/Getty Images)
    Here are the Pentagon CIO office’s new cybersecurity roles

    Department of Defense CIO Dana Deasy will have new responsibilities if the National Defense Authorization Act is signed by the president.

    Andrew Eversden
    December 10, 2019
  • A group of 14 congressmen, government officials and private sector experts are tasked with developing policies for three far-ranging cybersecurity areas. (ipopba/Getty Images)
    Cyber Solarium sets ambitious goals for U.S. digital strength

    A group of 14 congressmen, government officials and private sector experts are tasked with developing policies for three far-ranging cybersecurity areas.

    Jessie Bur
    May 14, 2019
  • In this 2018 file photo, lights shine inside the U.S. Capitol Building as night falls in Washington. (AP Photo/J. David Ake)
    Can security pros use the shutdown to their advantage?

    Darien Kindlund, of Insight Engines, explains how savvy cybersecurity professionals could use the shutdown of the federal government to help improve protection strategies.

    Daniel Woolfolk
    January 14, 2019
  • People vote on election day at Brooklyn Avenue Elementary School in the primarily Latino East LA neighborhood of Boyle Heights on Nov. 8, 2016, in Los Angeles, Calif. (Frederic J. Brown/AFP via Getty Images)
    The voting day crisis election officials fear

    Hacking of the unofficial results could lead to confusion and mistrust of the final result, according to election officials.

    Justin Lynch
    October 23, 2018
  • The U.S. government has put a glove on hacking back, but support for the idea has recently grown. (Welcomia)
    Support for ‘hack back’ grows after Trump’s pledge to get aggressive in cyberspace

    Support for the idea that businesses should be able to retaliate to cyberattacks, or “hack back,” has recently come from former government officials, experts and lawmakers who say it could be effective deterrent.

    Justin Lynch
    October 12, 2018
  • Researchers are feeling blue about the paper Social Security card because the market for cybercriminals stealing the data has been white hot. (Markus Kuncoro)
    Why the Social Security number needs a digital update

    Anywhere from 60 to 80 percent of Social Security numbers have been compromised by cybercriminals, a catalyst for protecting them with a more dynamic credential technology.

    Justin Lynch
    October 11, 2018
  • The U.S. will continue to work with like-minded states to develop cyber norms. (Virginia Mayo/AP)
    The problems transparency creates for cyber operations

    The United States will continue to work with like-minded states to develop cyber norms.

    Mark Pomerleau
    October 10, 2018
  • U.S. Airmen gather around a computer at the first U.S. Air Forces in Europe cyber-only exercise at the Warrior Preparation Center on Einsiedlerhof Air Station, Germany, May 10, 2018. The two-week long exercise, Tacet Venari, latin for silent hunt, pooled Airmen from four different units together forming mission defense teams, tasked with immobilizing adversaries through cyber defense. (U.S. Air Force photo by Airman 1st Class D. Blake Browning)
    Why the government will publicly name the hackers who attack the US

    The United States could begin attributing cyber incidents publicly with more frequency.

    Mark Pomerleau
    September 28, 2018
  • President Donald Trump walks to Air Force One on Sept. 19, 2018, at Andrews Air Force Base in Maryland. (Evan Vucci/AP)
    Trump’s national cyber strategy praised by experts

    President Donald Trump’s new national cyber strategy has been met with praise by experts and even political opponents

    Justin Lynch
    September 21, 2018
  • U.S. President Donald Trump, right, walks in with Defense Secretary Jim Mattis, left, as they arrive to attend the multilateral meeting of the North Atlantic Council, Wednesday, July 11, 2018 in Brussels, Belgium. (Pablo Martinez Monsivais/ AP)
    Trump’s new strategy calls for more cyberattacks

    President Donald Trump announced a new national cyber policy that promises more offensive operations, but an expert warns it could have unintended consequences.

    Justin Lynch
    September 20, 2018
Quick Links
Newsletters CyberCon
Whitepapers E-Books
Most Watched Videos

How newly-formed Space Force saved lives | Actionable Intelligence

A conversation with Nathan Strout of C4ISRNET.
promo
Securing battlefield data | Actionable Intelligence
promo
How the DoD took on work-from-home- Actionable Intelligence
promo
Defense Defined: What is electronic warfare?
Sign up for our Daily Brief
Get the top Cyber headlines in your inbox every weekday morning.
Enter a valid email address
Enter a valid email address
Thanks for signing up!
For more newsletters click here
  • Newsletters
  • Contact Us
  • facebook icon
  • twitter icon
  • linkedin icon
  • https://www.fifthdomain.com © 2021 Sightline Media Group
    Not A U.S. Government Publication
  • Civilian
  • DoD
  • Congress
  • Critical Infrastructure
  • International
  • Workforce
  • Industry
  • Thought Leadership
Terms of Use
  • Terms of Service
  • Privacy Policy
Get Us
  • Newsletters & Alerts
  • RSS Feed
Contact Us
  • Help & Contact Info
  • Advertise
About Us
  • About Us
  • Careers
Military News
Air Force News
Army News
Marine Corps News
Navy News
Defense News
Federal News
C4ISR
Cyber
History