Tag Archive for: briefs

Contract Briefs – Aerotech News & Review


U.S. Navy

BAE Systems Technology Solutions & Services Inc., Rockville, Md., (N00039-23-D-9001); DRS Laurel Technologies, Johnstown, Penn., (N00039-23-D-9002); Management Services Group, doing business as Global Technical Systems, Virginia Beach, Va., (N00039-23-D-9003); L3Harris, Camden, N.J., (N00039-23-D-9004); Leidos, Reston, Va., (N00039-23-D-9005); Peraton, Herndon, Va., (N00039-23-D-9006); Serco, Herndon, Va., (N00039-23-D-9007); and VT Milcom, Virginia Beach, Va., (N00039-23-D-9008), are awarded a $4,098,600,000 indefinite-delivery/indefinite-quantity, firm-fixed-price contract for Consolidated Afloat Networks and Enterprise Services (CANES) production units, software ñ initial, renewals and maintenance, spares and system components, and lab equipment. CANES is the Navy’s program of record that consolidates and replaces existing afloat networks providing the necessary infrastructure for applications, systems and services required to dominate the cyber warfare tactical domain. CANES represents a key aspect of the Navy’s modernization planning by upgrading cybersecurity, command and control, communications and intelligence systems afloat, and by replacing unaffordable and obsolete networks. The primary goals of the CANES program are to: 1) Provide a secure afloat network required for Naval and Joint Operations; 2) Consolidate and reduce the number of afloat networks through the use of Common Computing Environment and mature cross domain technologies; 3) Reduce the infrastructure footprint and associated Logistics, Sustainment, and Training costs; and 4) Increase reliability, security, interoperability and application hosting to meet current and projected warfighter requirements. Work will be performed in Huntsville, Ala.; San Diego, Calif.; Largo, Fla.; Ayer, Mass.; Long Beach, Miss.; Camden, N.J.; Johnstown, Penn.; Summerville, S.C.; Clarksville, Va.; Gainesville, Va.; Sterling, Va.; and Virginia Beach, Va. Work is expected to be completed by December 2032. Contract actions will be issued and funds obligated as individual delivery orders. Other procurement (Navy) funds will be placed on contract with an initial delivery order issued to each contractor on…

Source…

Report on Patient Privacy Volume 22, Number 2. Privacy Briefs: February 2022 | Health Care Compliance Association (HCCA)


◆ Tensions between the U.S. and Russia could lead to a heightened risk of Russian state-sponsored cyberattacks on U.S. interests, including health care organizations, federal agencies warned. Russia would consider conducting a cyberattack on the U.S. homeland if Moscow perceived that a U.S. or NATO response to a potential Russian invasion of Ukraine threatened Russia’s long-term national security, according to a Department of Homeland Security intelligence bulletin obtained by CNN.[1] 1 The Cybersecurity & Infrastructure Security Agency (CISA), FBI and the National Security Agency have urged organizations to be prepared with cyber incident response, resilience, and continuity of operations plans so that critical functions and operations can be kept running if technology systems are disrupted or need to be taken offline. The three agencies also urged organizations to enhance their cyber posture by following best practices, and to increase organizational vigilance by staying current on threat reporting.[2] John Riggi, national advisor for cybersecurity and risk at the American Hospital Association, warned that hospitals and health systems could be targeted directly, or could become “incidental victims or collateral damage of Russian-deployed malware or destructive ransomware that inadvertently penetrates U.S. health care.” Riggi noted that “a cyberattack could disrupt a mission-critical service provider to hospitals,” and added that “this is a good reminder for all to have robust downtime procedures, redundancy and business continuity plans to sustain a loss of on-premises or cloud-based mission-critical services or technology for up to four to six weeks.”[3]

◆ CISA also advised U.S. critical infrastructure organizations to review a Microsoft blog on malware identified in Ukraine and take action to strengthen their networks against potential cyberattacks.[4] The Microsoft Threat Intelligence Center reported evidence of destructive malware in systems belonging to several Ukrainian government agencies and organizations that work closely with the Ukrainian government.[5] The malware is disguised as ransomware, but if activated by the attacker, it would render the…

Source…

WikiLeaks publishes top secret NSA briefs showing US spied on France – Ars Technica (blog)


Ars Technica (blog)

WikiLeaks publishes top secret NSA briefs showing US spied on France
Ars Technica (blog)
On Tuesday, WikiLeaks published five top secret documents definitively showing that the National Security Agency has been spying on French President François Hollande, and his two immediate predecessors, Nicolas Sarkozy, and Jacques Chirac, among …

and more »

flame malware – read more

News briefs: Stuxnet, a Facebook vulnerability unveiled, and more – SC Magazine


SC Magazine

News briefs: Stuxnet, a Facebook vulnerability unveiled, and more
SC Magazine
»Researchers believe they have discovered the most advanced Android trojan yet. It targets smartphones users – exploiting two previously unknown vulnerabilities in the mobile platform, and a third flaw in separate software, called DEX2JAR – to send

android botnet – read more