Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Pentagon Invites Hackers to Attack its Websites

Ever wanted to hack Uncle Sam?

Provided you’re American and can pass a background check, go right ahead, the Pentagon said Wednesday.

Ever wanted to hack Uncle Sam?

Provided you’re American and can pass a background check, go right ahead, the Pentagon said Wednesday.

The US Department of Defense is inviting vetted hackers to test its cybersecurity under a pilot program that is the first of its kind in the federal government.

Called “Hack the Pentagon,” the so-called bug bounty program will give cash awards and other recognition to participants who can spot weaknesses on the Pentagon’s public web pages.

“I am always challenging our people to think outside the five-sided box that is the Pentagon,” Defense Secretary Ashton Carter said.

This “initiative will strengthen our digital defenses and ultimately enhance our national security.”

The pilot program is modeled after similar competitions conducted by major firms to improve network and product security.

A defense official said the project would be a cost-effective way of recruiting non-malicious “white hat” hackers to probe Pentagon vulnerabilities.

Advertisement. Scroll to continue reading.

“We want to bring in great talent, we want to take advantage of people who have the ability to help the Department of Defense and the country,” the official said.

He noted that if successful, the program could be more broadly expanded across the federal government.

The Pentagon did not announce how much money would be paid out, but suggested that the bigger the vulnerability a hacker finds, the bigger the reward.

The Pentagon announced the initiative while Carter visited Silicon Valley in California on Wednesday.

It is his third trip to the world’s tech heartland and he has repeatedly stressed the need for the Pentagon to innovate and work with tech partners.

Carter also announced plans to establish a “Defense Innovation Advisory Board” that will be chaired by Eric Schmidt, executive chairman of Alphabet, Google’s parent company.

The board will give Pentagon leaders independent advice on ways to address “future organizational and cultural challenges, including the use of technology alternatives,” Pentagon press secretary Peter Cook said in a statement.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.