Sustainment costs worry Kevin Buckley much more than upfront program procurement costs ever will, especially as he works to keep the U.S. Air Force’s aging fleet of transport aircraft flying and juggles issues such as obsolete replacement parts and a fatigued work force spread thin.
The “2015 Verizon Data Breach Investigations Report,” released this spring, states that the top three industries affected by cybermarauders are public, information and financial services. This is unchanged from the annual report’s results last year. The report adds that the estimated financial loss from 700 million compromised records totals $400 million.
Adversaries are becoming smarter and more active; their rate of growth itself is disruptive. To see this, all cyber professionals have to do is pay attention.
Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.
A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.
Extensive cooperation among NATO member nations, their industries and their academics will be necessary to address the challenges facing the Atlantic alliance, according to speakers at NITEC 2015.
The AFCEA Educational Foundation sponsors awards at the nation’s service academies and other military educational institutions. In addition, the top commissioning ROTC cadet in each service and midshipman are similarly recognized with an AFCEA Honor Award.
China is flexing its muscles and expanding its reach, particularly in the maritime domain. As the United States tries to consolidate the so-called pivot to Asia by bringing 60 percent of the U.S. fleet to bear, leaders need to be thinking through all their other options to deal with the growing ambition of the People’s Republic of China.
Drones are leaving the battlefield in droves, increasingly taking on non-lethal civilian and humanitarian missions as aid groups and private companies capitalize on technology that not only is more common, but more affordable and manageable.
The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.