Advertisement

bug bounty

Facebook designer Blaise DiPersia addresses the first Congressional Hackathon in the Congressional Auditorium at the Capitol Visitors Center December 7, 2011 in Washington, DC. (Photo by Chip Somodevilla/Getty Images)

Bug bounties, constituent casework automation among ideas touted at Congressional Hackathon

Ideas from hackathons carry no formal weight, but many have been implemented over the years, including public access to raw legislative data and digitizing casework processes for…
Chairwoman Nancy Mace (R-SC) speaks before a House hearing at the US Capitol on June 22, 2023 in Washington, DC. The House Committee on Oversight and Accountbility Subcommittee on Cybersecurity, Information Technology, and Government Innovation met to discuss the use of technology at the US Border, airports and military bases. (Photo by Tasos Katopodis/Getty Images)

Rep. Mace proposes new vulnerability disclosure rules for contractors

The Federal Cybersecurity Vulnerability Reduction Act will set requirements pushing federal contractors to employ vulnerability disclosure policies.
Advertisement
Emergency Deployment Readiness Exercise
A soldier assigned to 1st Stryker Brigade Combat Team, 4th Infantry Division, takes the Automated Neuropsychological Assessment Metrics as part of the 1st SBCT’s Emergency Deployment Readiness Exercise (EDRE) at Fort Carson, Colorado, July 18, 2020. (U.S. Army / Capt. Daniel Parker)

Army launches ‘Hack the Army 3.0’ with more targets for cybersecurity researchers

White-hat hackers will have from mid-December to the end of January to find vulnerabilities in the army.mil domain and other areas specified by the Army.
Advertisement
Advertisement
Advertisement