| . | ![]() |
. |
|
by Christen Mccurdy Washington DC (UPI) May 4, 2021
The Pentagon announced Tuesday that it is expanding its Vulnerability Disclosure Program to include all publicly accessible information systems in the Defense Department. The program grew out of the department's "Hack the Pentagon initiative," which started in 2016, according to a Pentagon press release. In 2016 then-Defense Secretary Ashton Carter met with two hackers to congratulate them for alerting the Pentagon to potential vulnerabilities in several Defense Department websites. The hackers were the most successful participants in a "Hack the Pentagon" event begun earlier that year -- the Defense Department's first-ever "bug bounty." Prior to that, there was no way for ethical hackers to interact with the Department of Defense even if they spotted a vulnerability in its systems. "Because of this, many vulnerabilities went unreported," Brett Goldstein, the director of the Defense Digital Service, said in the DoD's release. "The DOD Vulnerability Policy launched in 2016 because we demonstrated the efficacy of working with the hacker community and even hiring hackers to find and fix vulnerabilities in systems." The DoD Cyber Crime Center oversees the Vulnerability Disclosure Program, which has received more than 29,000 vulnerability reports -- 70% of which have been found to be valid, according to officials. The original policy was limited to the department's public-facing websites and applications, but now hackers are invited to investigate vulnerabilities related to all DOD publicly-accessible networks, Goldstein said in the release. The expansion also includes frequency-based communication, the Internet of Things and industrial control systems. "The department has always maintained the perspective that DOD websites were only the beginning as they account for a fraction of our overall attack surface," said Cyber Crime Center director Kristopher Johnson. In July 2015 a Pentagon email system used by personnel of the Joint Chiefs of Staff was breached in a sophisticated cyberattack officials said was committed by Russian state actors. In January 2020 the Pentagon announced that it would require at least some contractors bidding on defense contracts to certify that they meet "at least a basic level of cybersecurity standards" in their proposals.
Researchers demonstrate potential for zero-knowledge proofs in vulnerability disclosure Washington DC (AFNS) Apr 23, 2021 Today, the disclosure process for software vulnerabilities is fraught with challenges. Cybersecurity researchers and software security analysts are faced with an ethics versus efficacy dilemma when it comes to reporting or sharing discovered bugs. Revealing a vulnerability publicly may get the attention of the program's developers and motivate a timely response, but it could also result in a lawsuit against the researcher. Further, public disclosure could enable bad actors to exploit the discover ... read more
|
|||||||||||||
|
|
| The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |