On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service providers--an effort by its government to squelch public dissent- -virtually all Egyptian Internet addresses became unreachable worldwide.1 The action was unprecedented in Internet history.2 At the same time, the U.S. Senate
Topic: DoD Cyber Policy
Building on the success of the “Hack the Pentagon” bug bounty pilot in which hackers from across the country were provided legal authorization to spot vulnerabilities in specific Department of Defense networks in return for cash payments, the Department of Defense (DoD) today unveiled two new initiatives designed to further enhance the DoD cybersecurity.
Defending Department of Defense (DoD) networks, systems and data (DDNSD) is a complex and ongoing challenge. On November 13, 2013, the DoD Chief Information Officer issued a new cybersecurity strategy for the Department. At the end of March an unclassified version was made publicly available. Click on the icon below to download a copy of the document. In the