Advertisement

Department of Defense

LAS VEGAS, NEVADA – JANUARY 25: U.S. President Donald Trump speaks during a rally at Circa Resort & Casino on January 25, 2025 in Las Vegas, Nevada. The event focused on Trump’s first week in office, including his proposed policy to eliminate taxes on tips for service industry employees. (Photo by Ian Maule/Getty Images)

Trump pauses on grants, aid leaves federal cyber programs in state of confusion

A series of moves from the president raises questions about what’s next for the federal government’s many cyber grant and aid initiatives.
Former Defense Secretary Jim Mattis speaks at DefenseScoop’s DefenseTalks on May 22, 2024, in Washington, D.C. (Scoop News Group photo)

Mattis: Don’t create separate military cyber service

The former defense secretary said U.S. Cyber Command needs emergency authority to be able to operate inside the United States.
Advertisement
U.S. Secretary of Defense Lloyd Austin (2nd L) gives opening remarks as Chairman of the Joint Chiefs of Staff General Mark Milley (R) and Deputy Assistant Secretary of Defense for Russia, Ukraine, Eurasia Laura Cooper (L) listen during a virtual meeting of the Ukraine Defense Contact Group at the Pentagon on May 23. (Photo by Alex Wong/Getty Images)

The Pentagon may require vendors certify their software is free of known flaws. Experts are split.

The debate is over whether the provision is unrealistic or if it's a game changing move to cut down on software vulnerabilities.
The seals of the U.S. Cyber Command, the National Security Agency and the Central Security Service greet employees and visitors at the campus the three organizations share March 13, 2015 in Fort Meade, Maryland. The National Security Agency today released an advisory to the defense sector detailing APTs. (PHOTO: Chip Somodevilla/Getty Images)

U.S. Cyber Command gives Congress $236M unfunded priorities wish list

The U.S. Cyber Command unfunded priorities wish list includes $168 million to enhance the Cyber Mission Force, a group conducting offensive and defensive cyber operations.
Advertisement
Advertisement