The Parliamentary Assembly will discuss a report urging governments to take a more proactive role in defining the IoT's future at its spring session.
The Department of Homeland Security’s S&T Directorate announced the transition of Hyperion, a malware detection technology, to the commercial marketplace.
The need for innovation in cybersecurity often is stymied by procurement complications.
Threat hunting allows cyber attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
The U.S. Army must conduct cyber operations at increasingly lower operational levels while being limited in needed authorities.
Although Americans expect major cyber attacks to be a way of life in the near future and lack trust in modern institutions to protect their personal data, they fail to follow cyber best practices, the Pew Research Center reports.
The U.S. Army is responding to the high demand for cyber experts with a new program that could let qualified civilians be commissioned directly into the service with a rank up to colonel. The Defense Department also is looking into whether the idea could work for the other services.
The third annual CyberThon event drew in more students than ever, providing hands-on cybersecurity, defense training to students of many ages who worked to defeat simulated cybersecurity threats to an online banking network. Students from dozens of Florida schools participated in the challenge hosted by AFCEA's Pensacola "Blue Angels" Chapter.
As the nation deals with intelligence reports of Russian hacks of the U.S. presidential election, some of us in industry are pondering how President Donald Trump will tackle cybersecurity issues. He already has a good road map. In December, the Commission on Enhancing National Cybersecurity issued its “Report on Securing and Growing the Digital Economy.” It is high time the executive branch dug deeply into cybersecurity issues, writes RedSeal's Ray Rothrock.
The Army Cyber Center of Excellence is requesting research papers that address specific areas that answer learning demands or capability gaps that inhibit operational force effectiveness or efficiency.
The security risk from personal devices is much larger than policies alone can control.
There’s no disputing technology’s role in the rapidly changing face of modern warfare. The convergence of commercial services with military applications, such as delivery of real-time data from anywhere using various devices, has changed what constitutes a combat environment. The U.S. military seeks to define a strategic approach to these converged operations. Time is of the essence, writes Kenneth Parks of Harris Corporation.
Richard Hale, the Defense Department chief information security officer, has retired after a long and distinguished career in public service. He will be missed, but he leaves a legacy of others following his model.
The Department of Homeland Security Science and Technology Directorate’s Homeland Security Advanced Research Projects Agency has announced that ZeroPoint, an exploit detection and analytics tool, has spun off as a startup company called ZeroPoint Dynamics.
Hackers, take your mark. Building on the successes of the U.S. Defense Department’s “Hack the Pentagon” bug bounty program launched earlier this year, the Army now launches its own challenge. it’s now the Army’s turn.
Terry Halvorsen, U.S. Defense Department chief information officer, told the AFCEA TechNet Asia-Pacific audience he is concerned about the cyber threat posed by insiders, but he also warned against limiting employees’ sense of freedom.
U.S. military and civilian experts on protecting critical infrastructure control systems debated whether a cyber attack on common information systems or on industrial control systems would be more deadly in response to an audience question at the AFCEA TechNet Asia-Pacific conference in Honolulu.
Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities. Speaking at AFCEA TechNet Asia-Pacific, a panel of cyber experts agreed that the authorities to conduct cyber operations—along with policies, doctrine, tactics, techniques and procedures—still need to be defined even as technology advances rapidly.
Trust—or a lack thereof—is one of the biggest impediments to information sharing among coalitions and partner nations, according to a panel of experts speaking at the AFCEA TechNet conference in Honolulu. Randy Cieslak, chief information officer for the U.S. Pacific Command, led the panel. He described cyber as a two-edged sword available to both good guys and bad.
The military that can control and deny access to and use of the electromagnetic spectrum will be the victor of the next war, predicts Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force. Attaining supremacy within that crucial domain should be driving emerging technologies that will give the U.S. military the technical overmatch on the battlefield.