{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
We've got two dispatches about the aftermath of the presidential election, as well as a cautionary tale about coronavirus contact-tracing apps. This is CyberScoop for Wednesday, Nov. 11, 2020.

Biden transition work on cyber is afoot, despite Trump administration hurdles

The Trump administration is blocking traditional transition initiatives, prompting four former Department of Homeland Security secretaries to warn that national security stands in harm's way. Most notably, the Office of the Director of National Intelligence says it won't interact with Joe Biden's transition until the General Services Administration gives the go-ahead, something GSA hasn't done yet. Biden nonetheless announced agency review teams that include a bevy of former DHS, intelligence and defense hands. Tim Starks examines the standoff.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Ex-DOJ officials slam Barr’s new election investigations policy

After Attorney General William Barr reversed a longstanding Justice Department policy on waiting for election results to be certified before investigating claims of fraud, former Justice officials from Republican and Democratic administrations are speaking out. “The voters decide the winner in an election, not the president, and not the attorney general,” the ex-officials’ statement reads. A Justice Department spokesperson declined to comment. Sean Lyngaas has more.

Researchers flag security flaw in Philippines COVID-tracing app

A web and mobile phone application that the Philippines government uses to track coronavirus cases contained a flaw that could have allowed access to the names of tens of thousands of health care providers that use the app in that country, University of Toronto's Citizen Lab said Tuesday. "We are concerned but did not confirm that an attacker could also leverage this vulnerability to cause the app to reveal sensitive patient data," the researchers wrote. The flaw has been fixed, but it stands out as another cautionary tale of how software tools used to combat the pandemic can open up new fronts in data insecurity. Sean breaks it down.

Palo Alto Networks wants more eyes on the internet

Cybersecurity giant Palo Alto Networks plans to acquire San Francisco-based Expanse, a company with expertise in monitoring the internet for exposed assets that could be ripe for cyberattacks. The $800 million deal is expected to close sometime before the end of February. Expanse’s strength is mapping and managing the digital attack surfaces of companies, governmental agencies and other organizations. Palo Alto Networks said it plans to use Expanse's technology to bolster its security operations center (SOC) product called Cortex. Joe Warminsky sizes up the deal.

Hack the Army 3.0 is coming soon

The Army is hoping to pull in more freelance cybersecurity researchers than ever for Hack the Army 3.0, its latest bug bounty competition. The program will begin in mid-December and continue for about a month. The Army says the entire .mil domain can be targeted this time by participating white-hat hackers. Other available targets include sign-on/authentication services and Army-owned VPNs. Bug bounty platform HackerOne is running the competition. Hack the Army 2.0 gave out $275,000 in prizes late last year. Jackson Barnett has more at FedScoop.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}