Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

signalarticles

A New Approach Is Needed to Protect Defense Department Cybersystems

October 1, 2014
By Paul A. Strassmann

Budget cuts and rapidly improving information technology are forcing the U.S. Defense Department to confront increasing cybersecurity demands without commensurate increases in available resources

Incoming: In Praise of Quantity

October 1, 2014
By Lt. Gen. Daniel P. Bolger, USA (Ret.)

The late Vladimir Ilyich Ulyanov, better known by his nom de guerre, V.I. Lenin, used to be famous, or at least infamous. As the founding dictator of revolutionary Russia, Lenin built a grim, cruel and mighty police state whose oppressive successor to this day menaces all too many unhappy people in eastern Europe. The man the Communists once idolized as “our dear Ilyich” is long gone and, in decent circles, not missed very much.

President's Commentary: Think Tactically, Act Strategically

October 1, 2014
By Lt. Gen. Robert M. Shea, USMC (Ret.)

A key challenge to building a new tactical technology acquisition model is that it requires carefully identifying and prioritizing requirements, as well as staying engaged with the acquisition arm of government throughout the acquisition process. Carefully defining an operational requirement—not the end technical solution—allows industry to develop and provide the most effective solution. Industry has a strong economic impetus to provide the capability that the operating forces require.

PEO Spotlight: How to Do Business with the U.S. Coast Guard

October 1, 2014
By Rita Boland

U.S. Coast Guard acquisitions are focusing on requirements across an array of major projects. Though the Department of Homeland Security organization has vastly different efforts underway, all demand clear guidelines and teamwork, including unambiguous understandings with the private sector.

Advanced Protection 
in a Public Cloud

October 1, 2014
By Rita Boland

As organizations migrate more data into public clouds, demands for a different type of security are emerging. A specialized option is available now for Amazon Web Services that aims to mitigate threats more quickly by finding them faster and suggesting methods of remediation.

Federal IG Access to Data Overcast by Rush to the Cloud

October 1, 2014
By Sandra Jontz

When cloud computing revolutionized the way businesses stored, processed and transmitted data, the rapid transformation—as with a lot of technological advances—left U.S. government agencies behind the times.

Ramping Up the
 Federal Cloud Against the Insider Threat

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

Awaited Technologies About to Become Reality for Warfighters

October 1, 2014
By Rita Boland

The U.S. Army is extending advanced communications to disadvantaged users, fielding a series of capabilities to various groups in an effort to give soldiers at the pointy end of the spear the connectivity they need. With the rollout, forward-deployed troops should be able to access classified networks via wireless 4G long-term evolution connections. National Guard units also are acquiring the tools to aid their troops in disaster response scenarios.

Isolation
 Mechanisms 
Help Protect Data in Public Cloud

October 1, 2014
By Sandra Jontz

Explosive amounts of data and the strains on limited financial resources have prompted corporations and governmental agencies alike to explore joint tenancy in the cloud for storing, processing and transmitting data. But while good fences—or in this case isolation mechanisms—make good neighbors, in the virtual world of cloud security the idiom might not ring entirely true. In the public cloud arena, risks arise when organizations place their data in a cloud system but cannot control who their neighbors might be.

Combating Terrorism with Next-Generation Mesh Networking

October 1, 2014
By George I. Seffers

U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.

Pages

Subscribe to signalarticles