U.S. military Information Assurance runs proxies to protect Joint Task Force Guantanamo servers from malicious websites. U.S. Military Cyber Commands Sweeten Bonuses, Deals to Retain Cyberwarriors

Recruiting for a qualified military and civilian workforce for the U.S. Defense Department's cybersecurity mission has proven successful so far, but retaining the force remains to be seen, cyber commanders told Congress during a hearing.

Two U.S. Air Force space and cyber airmen work in the Global Strategic Warning and Space Surveillance Systems Center at Cheyenne Mountain Air Force Station, Colorado. The Air Force aims to change the nature of its cyber work force as it transitions deeper into the information age. An Air Force In Transition Adjusts for the Cyber Age

The U.S. Air Force is striving to become a multi-domain warfighting unit in the air, in space and in cyber, according to its chief information officer. However, attaining the same degree of supremacy in cyber that it currently enjoys in the air domain may prove a far more daunting task.

U.S. Air Force aircraft of the 4th Fighter Wing fly over Kuwaiti oil fires set by the retreating Iraqi army during Operation Desert Storm in 1991. NATO air power has not been challenged in recent conflicts, but with resources and capabilities dwindling, NATO officials are sounding warning bells about the future. NATO Officials Sounding Air and Space Power Alarm

In recent decades, air power has been NATO’s first, and sometimes only, military response to a threat. But tightened budgets and dwindling resources are placing air power in a death spiral driven by declining readiness, a shrinking force structure and an ever-smaller residual fighting capacity, say NATO’s foremost experts on air and space power.

Government and private sector industrial control systems (ICS) professionals participate in an ICS cybersecurity training exercise at the Department of Homeland Security’s Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT) training facility in Idaho Falls, Idaho. Critical Infrastructure Is Cyberterrorism’s Next Likely Target

The next big cyber attack likely will strike critical infrastructure assets in the United States, which could bring the world’s remaining superpower to its knees, according to cybersecurity experts. This would constitute a crippling assault against national assets such as power facilities, transportation networks, nuclear plants or the drinking water supply, these experts warn.

A Standard Missile 3 is launched from the guided missile cruiser USS Shiloh during a ballistic missile flight test in the Pacific Ocean. Virtually every wartime mission for the U.S. Defense Department, including command and control of major weapon systems, relies on information technology, making cybersecurity a top priority for critical infrastructure protection. U.S. Defense Department Developing Critical Infrastructure Intelligence Network

An intelligence network being developed at the Pentagon will enable military leaders to monitor disasters as they happen. The network will provide a common operating picture, allowing officials to better plan for and react to events adversely affecting the critical infrastructure and the military mission.

In preparation for the Warfighter Information Network-Tactical (WIN-T) Increment 2 initial operational test and evaluation, soldiers train on the move during the WIN-T Increment 2 new equipment training at Fort Bliss, Texas. Simplifying the network is a major priority for Maj. Gen. Daniel Hughes, USA, program executive officer, command, control and communications-tactical. PEO Spotlight: Shaking Up the Radio Marketplace

The U.S. Army, which purchases vast numbers of tactical radios, will no longer do so through sole-source contracting, vows Maj. Gen. Daniel Hughes, USA, PEO-C3T. Competing every single contract is designed to create a radio marketplace that fosters innovation while saving time and money.

1
2
3
4
5
6