NASA Faced Cybersecurity Threats During Government Shutdown

NASA Faced Cybersecurity Threats During Government Shutdown

According to Renee Wynn, NASA’s Chief Information Officer, NASA’s Security Operations Center (SOC) continued to operate 24/7 during the government shutdown, fighting cybersecurity threats.

NASA’s cybersecurity was threatened during the partial shutdown of the U.S. government, NASA officials said at a post-shutdown town hall meeting Jan. 29.

"NASA is one of the — it is the most attacked agency in the federal government when it comes to cybersecurity," said NASA Administrator Jim Bridenstine during the town hall, Space.com reported.

"Across the world there are governments that are very, very interested in what we're doing, because technology ultimately determines the balance of power on Earth, and we are doing things that are very, very advanced technology," Bridenstine said. "There are people who would love to use it not for the benefit of humankind, but for their own power purposes."

According to Renee Wynn, NASA’s Chief Information Officer, NASA’s Security Operations Center (SOC) continued to operate 24/7 during the government shutdown, fighting cybersecurity threats.

"We do have to protect your data, and we have to protect the integrity of all the data that NASA gets and shares," Wynn said. "That is our main driver in cybersecurity. [It's] you and our name, our reputation — which is through our data and the science, engineering, mathematics and technology discovered through that."

The SOC researched incidents during the shutdown and reported that, on average, NASA faced about one cybersecurity threat per day, Wynn said. She said that cybersecurity threats aren’t always hackers, but that NASA employees losing their government phone also counts as a threat to security.

“Cybersecurity in the most part was fully functional” during the shutdown thanks to the SOC, Wynn said. "I say 'in the most part,' because we also had to think about funds conservation, and so while cybersecurity is important, there are things that are more important than other things."

Some NASA websites had to be taken down during the shutdown because their website certificates had expired, for example. Websites that were no longer deemed secure could be vulnerable to hacking and pose a risk to NASA data. According to Wynn, NASA took down at least 35 sites due to security certification expiration during the shutdown.

Despite some cybersecurity concerns during the shutdown, Wynn said that the most recent Department of Homeland Security scan showed that NASA “had no external-facing, critical issues. In my opinion, for now, we got through this really well,” she said.

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

  • Cutting Retail Losses

    Retail is still a more complex and dynamic security vertical in modern society. Inherent challenges with in-store and distribution center operations are primarily due to constantly shifting consumer buying trends. Retailers must show daily flexibility to keep workers, meet sales goals and attract customers while maintaining safe and efficient operations. Retail is an intricate web of interconnected elements. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3