A cybersecurity survey of federal information technology (IT) professionals revealed that 53 percent of the U.S. Defense Department IT professionals polled tagged careless and untrained insiders as their top cybersecurity threat source, a hazard that topped threats from foreign governments—with 48 percent of the vote—and terrorists—31 percent.
High school students from six schools across the nation will split $50,000 in scholarships after competing in the CyberPatriot VI competition, a culminating tournament in which participants tested strategies to defend computers and networks against cyber attacks. CyberPatriot kicked off in November with roughly 1,600 students from all 50 states and wrapped up March 29, 2014.
The Department of Veterans Affairs (VA) remains plagued by decades-old problems of unreliable and vulnerable networks and computer systems, putting the veterans they serve at risk, according to a recent government report. Despite years of documented weaknesses, the VA still has failed to shore up vulnerabilities, according to the Government Accountability Office (GAO) report.
The practice of awarding bronze stars to mid-level officers who never set foot outside the wire might see a demise similar to that of the controversial Distinguished Warfare Medal of a year ago, if a new department directive bears fruit. Defense Secretary Chuck Hagel this week directed each of the service leaders and combatant commanders to conduct a high-level, comprehensive review of military decorations and the awards program.
Thales recently announced the company has signed a memorandum of understanding with the Qatar Armed Forces to assist in the development of an Optionally Piloted Vehicle-Aircraft (OPV-A), a high-performance intelligence, surveillance, target acquisition and reconnaissance system.
Defense industry leaders desire greater government involvement in the defense acquisition process, according to a recent survey released by the Government Business Council (GBC). Of the 340 survey participants, 85 percent of respondents noted positive outcome from more government involvement in the acquisition arena.
The earthquake that hit Los Angeles this week gave many on the West Coast a rude awakening. The free Earthquake app by the American Red Cross provides step-by-step instructions for what to do before, during and after an earthquake, even if the power is out or you don't have data connectivity.
The bottom line is that the Internet today is more like the Wild West than the researchers who gave birth to it envisioned, but its inherent dangers have inspired techno-creativity to an extent that they also could not have anticipated. That’s probably something the bad guys also never predicted.
The Federal Law Enforcement Training Center (FLETC) is becoming known as the “Disneyland for law enforcement” because of the facility’s extensive use of sophisticated simulation technologies, according to Sandy Peavy, FLETC chief information officer.
The troubles may soon end for the Department of Homeland Security’s (DHS’s) seven-year, $22 billion Enterprise Acquisition Gateway for Leading Edge Solutions II (EAGLE II) contract, and the program will ultimately be successful, indicated Nick Nayak, DHS chief procurement officer.
Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.
The realm of cybersecurity is continually evolving and will continue to do so, indicates Tony Sager, director of programs, Council on CyberSecurity. While participating on the Professionalization of Cybersecurity panel at the AFCEA Homeland Security Conference in Washington, D.C., Sager discussed the evolution he has seen during his career in information technology.
Many people experience a defining moment in time or an event that defines their commitment to service. For James Blasingame, deputy national intelligence manager (NIM) for the Western Hemisphere for homeland, that defining moment came in 1995 at time of national tragedy.