Latest Blog Entries

Pursuing Cyber Active Defense for Corporations
July 27, 2015
By Robert Clark

Strong legal issues must be addressed before companies take cyber active defense into their own hands.

Focusing on Acquisition Reform
July 24, 2015
By M. Thomas Davis

Acquisition reform remains a long-sought goal of defense procurement experts, but their efforts have a greater urgency as the existing system threatens the very existence of the defense industrial base.

DHS Expands Cyber Crime Center
July 22, 2015
By George I. Seffers

New cyber crime facility provides enhanced operational and training capabilities to meet the growing cyber mission. 

'Delete' Seems to be the Hardest Word
July 17, 2015
By Justin Marston

Is it possible to reliably delete data from commercial mobile devices? Guest blogger Justin Marston delves into the quandary that makes it difficult for the intelligence community to turn to the private sector for some of its communications needs. 

Solving the DOD Network Visibility Crisis
July 15, 2015
By Davis Johnson

In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.

Government Seeks Advanced Broadband Research Partners
July 14, 2015

The Commerce Department’s Public Safety Communications Research program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.

The Bottom Line: We Saw Them Coming
July 14, 2015
Maryann Lawlor

The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...

Good Grief: Isn't Anyone Responsible Here?
July 13, 2015
By Dr. Wesley Kaplow

The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.

STEM Is a 21st Century Critical Element of National Security
July 9, 2015
By David E. Meadows

Just as when the Soviet Union launched Sputnik nearly 58 years ago, the science community in the United States must rise to the occasion in a national security effort for information technology.

Employees Are Not the Weakest Link in Cyber
July 2, 2015
By Robert Clark

Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?

Additional Entries ...