SIGNAL Blogs

June 25, 2014
By Robert K. Ackerman

Defenders of cyberspace need to concentrate on the critical services provided by the critical infrastructure, not the infrastructure itself, according to a leading cyber expert. Melissa Hathaway, president of Hathaway Global Strategies and former acting senior director for cyberspace with the National Security Council, said that the future of the West is held hostage to the fact that its security and resilience are threatened.

June 25, 2014
By Robert K. Ackerman

Even with the rising tide of nation-sponsored cyber attacks, NATO does not yet have a policy—let alone a definition—of what constitutes a cyber attack that would mandate a response under Article 5 of the alliance’s Washington Treaty, according to NATO officials. Article 5 defines an attack on a NATO member as “an attack on all,” requiring a response by all members against an aggressor.

June 24, 2014
By Robert K. Ackerman

With cyber losses running in the hundreds of billions of dollars, the private sector must establish its own standards for cybersecurity or face government regulations that would be painful for some firms. Either way, regulatory guidance is necessary for the private sector to avoid potentially fatal hemorrhaging of assets and information to cybermarauders.

June 24, 2014
By Robert K. Ackerman

A new management trend may impel corporations to implement better cybersecurity: lead or get out of the way. Either corporate leaders take the initiative for improving their companies' cybersecurity, or shareholders will demand their ouster following a damaging attack that puts corporate futures in doubt.

June 24, 2014
By Robert K. Ackerman

Businesses that neglect their cybersecurity needs risk being put out of business by even the simplest of attacks, according to cybersecurity experts. While all companies face the threat of a devastating financial cyber robbery, even a simple attack that steals information could be the end for a small- or medium-size business.

June 24, 2014
By Robert K. Ackerman

Many U.S. companies are losing business because of cyber issues expressed by foreign firms. These concerns can range from fears of U.S. vulnerabilities to worries that intelligence agencies will have access to information held by U.S. contractors.

June 24, 2014
By Robert K. Ackerman

"Cyber is the ultimate team sport." The U.S. Cyber Command (CYBERCOM) faces a unique set of challenges as it tries to engage industry and academia in the cybersecurity effort, according to its commander.

June 24, 2014
By Robert K. Ackerman

The U.S. Cyber Command (CYBERCOM) views the Defense Information Systems Agency as a key partner in its effort to secure defense cyberspace. This includes the agency having an operational mission in which it plays a critical role in defending defense cyberspace, according to the commander of CYBERCOM.

June 24, 2014
By Robert K. Ackerman

Situational awareness, automated decision making and a new way to refresh work force skills rank high on the U.S. Cyber Command's (CYBERCOM's) list of needs from industry, according to its commander.

June 24, 2014
By Robert K. Ackerman

Innovation may be the key to ensuring that the national critical infrastructure is protected from new cyberthreats, said Suzanne Spaulding, undersecretary for the National Protection and Programs Directorate at the DHS. The private sector must step in to help prevent future attacks.

June 24, 2014
By Robert K. Ackerman

The public/private partnership that influences many government efforts is a core effort as the Department of Homeland Security (DHS) strives to protect the homeland from cyber attacks. Above all, the private sector must take the lead in some endeavors. “We need improved cyber hygiene.”

June 24, 2014
By Robert K. Ackerman

The Department of Homeland Security is taking a holistic approach to cybersecurity that focuses on preventing or mitigating the effects of a cyber intrusion on the critical infrastructure, according to a department undersecretary speaking at the AFCEA International Cyber Symposium.

June 24, 2014
By Beverly Mowery Cooper

Too much time spent chasing the obvious takes away from the ability to find the less obvious risks when it comes to stopping cyberthreats. Attacks from foreign adversaries, insider threats and advanced persistent threats all look the same, so it is essential to understand what is normal and to take immediate action when an anomaly is detected.

June 12, 2014
By Sandra Jontz

The White House is going green. Well, more like slate gray. And only on the roof.

June 10, 2014
By Sandra Jontz

The Federal Aviation Administration has authorized the first commercial drone to fly over land, giving the OK to energy giant BP Exploration Incorporated, which can use it to provide mapping, geographic information system (GIS) and other commercial information services at its Prudhoe Bay oil field.

June 9, 2014
By Sandra Jontz

Middle and high school participants of the fourth annual SeaPerch National Challenge were able to monitor their underwater robots as they navigated obstacle courses thanks to technology sponsored by the Office of Naval Research and the Association for Unmanned Vehicle Systems International Foundation.

June 5, 2014
By Sandra Jontz

The U.S. Army has baked up a scheme to add pizza to its Meal, Ready-to-Eat (MRE) menu. And in keeping with military tradition of making just about any project, program or technology part of an alphabet soup, has assigned it the acronym SSP—shelf stable pizza.

June 5, 2014
By Sandra Jontz

The National Centers for Environmental Prediction (NCEP) has teamed with the U.S. Navy to use naval technology to better forecast ocean currents and possible dangers that now can be employed for commercial and public use, according to a press release.

June 11, 2014
By Maryann Lawlor

Graduation ceremony speech from Adm. McRaven, Navy SEAL and commander, U.S. Special Forces Command, encompasses wisdom for all: Make your bed. Face the sharks. Respect everyone.

June 4, 2014
By Chris LaPoint

Ongoing changes in the tactical networks—the mobile battlefield—should provide the U.S. Cyber Command with an increased ability to discover and address vulnerabilities in these networks.

Pages