Some of today’s 9-year-olds code in Java during their summer vacations, making them the optimal candidates the U.S. government and military should school to be the next generation of cyberwarriors.
Uncle Sam wants you—especially unicorns, leprechauns or something in between. As the U.S. Defense Department revamps the way it protects its critical infrastructures and networks from emerging cyberthreats, military leaders want to reshape their work force and attract to their ranks highly specialized experts, including coveted data scientists.
Convergence was the buzzword du jour as leaders outlined major changes to sweep the U.S. Army in efforts to shore up cyber weaknesses following a year of high-profile breaches and hacks that stunned the Defense Department. It is part of a cultural change that will have several military disciplines working together and removing the divides that have kept the intelligence community from working closely with signal commands, electronic warfare, cyber and information operations.
The Defense Department’s much-anticipated capability solution to access classified voice and email up to the secret level from mobile devices finally migrated from the pilot stage and now is operational; while at the NGA, they've got an app store up and running that serves as a clearing house for geospatial-related mobile applications.
As if cyber breaches of key federal networks haven’t been problematic enough for experts, hackers increasingly target smaller branch offices that present a weak link in cybersecurity.
Congress and the federal government have heard the clamor of small-business owners and want to ease the cumbersome federal-contracting process and level the playing field between small and large companies competing for government-contracting dollars, experts said during an AFCEA International program.
There is one top-priority, underlying message throughout the new maritime strategy. The need for seapower is greater than ever.
Each year, the AFCEA Educational Foundation and AFCEA International chapters provide more than $2 million in grants and scholarships to deserving undergraduate and graduate students in 24 various STEM-related degree programs in computer science, cybersecurity, information technology, telecommunications engineering, mathematics and other similar academic areas.
While serving as the first luncheon keynote speaker at AFCEA’s Defensive Cyber Operations Symposium, Lt. Gen. Ronnie D. Hawkins Jr., USAF, outgoing director of the Defense Information Systems Agency (DISA), compared cyber and traditional weapons.
The U.S. Army has seized on the concept of complexity in warfighting as it faces a multitude of potential threats. Gone are the days when enemies were defined by clear lines, both substantively and operationally.