mobile

July 1, 2013
By George I. Seffers
The National Security Agency's Information Assurance Directorate is responsible for securing data for the entire national communications system.

While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.

July 1, 2013
By Max Cacas
Eric Forsythe, Ph.D., team leader and flexible electronics display deputy project manager  with the Army Research Laboratory, poses with some of the equipment used to produce the flexible displays at the Army's Flexible Display Center at Arizona State University.

Recent developments in advanced materials bring the Army closer to next-generation displays for a new breed of warfighter mobile devices.

June 26, 2013
By Rita Boland

The Multi-Access Cellular Extension project develops the foundational architecture to integrate the equivalent of commercial cellular technologies into future force networks to enable communications by filling in gaps in fixed infrastructure.

June 1, 2013
By Robert K. Ackerman
A U.S. Air Force network administrator employs a laptop at Kandahar Airfield, Afghanistan.

The U.S. Cyber Command is developing a strategy that acknowledges the convergence of network systems by empowering a similar convergence of military disciplines to help place U.S. cyberspace operators on a level field with their malevolent counterparts. This strategy acknowledges that the structure of the cyberforce has not kept pace with technology developments. As all types of information management—networking, communications and data storage—became digitized, previously disparate disciplines assumed greater commonality. With more common aspects, these disciplines share similar vulnerabilities as well as potential solutions.

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

May 1, 2013

The National Institute of Standards and Technology (NIST) has released the most comprehensive update to the government’s computer security guide since 2005. The fourth revision of “Security and Privacy Controls for Federal information Systems and Organizations” (SP 800-53) addresses issues such as mobile and cloud computing, applications security, supply chain risks and privacy concerns.

May 1, 2013
By Robert K. Ackerman
A Joint Network Node (r) and a satellite transportable terminal, part of the U.S. Army’s Warfighter Information Network–Tactical (WIN–T) Increment 1, are set up at Aberdeen Proving Ground, Maryland. WIN–T Increment 1 has been fielded to the force, and work on Increment 2 aims to begin deployment this year.

The same approach used to test and implement the Army’s single largest networking system is laying the groundwork for extending the network down to the individual soldier. As laboratory tests and field exercises validate the interoperability of separate elements in a network, system conflicts are giving way to greater commonality among different elements.

March 20, 2013
By George I. Seffers

The U.S. National Nuclear Security Administration (NNSA) began working on its Yourcloud solution about two years ago and expects to have the cloud computing solution in place by year's end. You can read more about this in "U.S. Nuclear Agency Enhances Cybersecurity With Cloud Computing
." 

March 4, 2013

Despite continued budget crunching, U.S. Defense Department officials are continuing to implement a three-phase plan to equip the department’s 600,000 mobile-device users with secure classified and protected unclassified mobile solutions that leverage commercial products. In conjunction with the Defense Information Systems Agency, the department’s chief information officer is establishing a basic multivendor mobility capability with the Defense Department for assessment.

February 1, 2013
By George I. Seffers
Border patrol personnel use horses to navigate remote terrain.

The U.S. agency responsible for customs and border protection has suffered from an unreliable infrastructure and network downtimes but already is seeing benefits from a fledgling move to cloud computing. Those benefits include greater reliability and efficiency and lower costs.

February 1, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 3

January 15, 2013

The AFCEA 2013 Source Book is now available in both digital and app formats. The searchable digital version is available at www.afceasourcebookdirectory-digital.com. It includes corporate profiles for all AFCEA corporate members with all email addresses and company websites hyperlinked. The Source Book also includes descriptions of AFCEA chapters as well as functional and governing committees.

October 30, 2012

Following the lead set by NASA, the Department of Veterans Affairs and several other federal agencies, the Defense Information Systems Agency (DISA) has posted a solicitation for an enterprisewide Mobile Device Management system and Mobile Application Store (MDM-MAS). As many as 260,000 devices could reach authorized security resources and data initially through the DISA app store, which could eventually expand to support the needs of the entire Defense Department.

October 1, 2012
By Max Cacas

A new computing architecture emphasizes shared resources.

September 12, 2012
By Robert K. Ackerman

The defense information technology realm is exploding with innovation—so much so, the organizations tasked with ensuring effective information systems run the risk of losing control of both the process and its capabilities. The Defense Information Systems Agency has issued a new strategic plan that outlines its approach to ensuring advanced technology implementation without reining in innovation.

 

May 9, 2012
By Rita Boland

The U.S. Defense Department must move to a single identity management system, the department's chief information officer said today at the Defense Information Systems Agency (DISA) Mission Partner Conference. Teri Takai stated that enterprise email is a driver of that system but acknowledged that the bigger concern is the identity management rather than whether all the military services embrace the email migration.

November 4, 2011
By Beverly Schaeffer

The National Security Agency is working to develop its own secure mobile phone architecture-using commercial off-the-shelf technologies only.

July 22, 2011
By Rachel Eisenhower

The effort to field mobile devices down to the squad level continues as the U.S. Defense Department certifies security credentials for the iPhone and Android operating systems. However, the arduous accreditation process still poses many hurdles for the military as it moves toward a more mobile communications environment.

Pages