Cybersecurity

May 1, 2015
By George I. Seffers

Twenty companies will participate in a trade mission with Romania and Poland.

April 28, 2015
By Maryann Lawlor

Although cybersecurity has been getting a lot of well-deserved attention lately, 90 percent of companies recently surveyed admit that their organizations have invested in a security technology that was ultimately discontinued or scrapped before or soon after deployment. 

April 15, 2015
By Ed Bender

Welcome to the security world, where agencies worry about cyber attacks from the outside as much as from the inside. Guest blogger Ed Bender highlights some surprising results from a recent survey in which respondents lament the insider threat; both from those who intend harm and those who inadvertently invite it.

April 1, 2015
By Sandra Jontz

New methods of teaching cybersecurity might be the best hope for providing the necessary security experts to turn the tide against malicious cybercriminals who have launched constant battles against vital networks.

March 26, 2015
By Sandra Jontz
An example of neutron imaging: On the left, lilies photographed through an open cask. On the right, a neutron imaging system used to photograph the lilies through the lead walls of the cask. This image demonstrates the power of neutrons to easily pass through otherwise impenetrable materials.

The notion of nefarious scientists re-engineering the genetics of living organisms to then weaponize their new specimens has some researchers jostling for the upper hand, including those at the U.S. Defense Department’s main research agency. 

February 24, 2015
By Maryann Lawlor

The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.

February 20, 2015

Northrop Grumman Space Mission Systems Corp., San Diego, has been awarded a $6,926,501 modification (P00094) to previously awarded contract FA8726-09-C-0010 for risk management framework. Contractor will meet cybersecurity requirements using the new Risk Management Framework. Work will be performed in San Diego, and is expected to be complete by June 22, 2015. This award is the result of a sole-source acquisition.

February 20, 2015
By Sandra Jontz
A cyber Joint Users Interoperability Communications Exercise, or JUICE, takes place at Aberdeen Proving Ground, Maryland.

As cybersecurity defenses improve, so do the breaching tactics and methods by adversaries driven to hack into commercial and government networks. And they are doing so at alarming speeds, outpacing defense efforts. 

February 11, 2015
By Sandra Jontz

The White House this week announced that it is creating a federal agency to keep tabs on and counter cybersecurity threats against the United States. The Cyber Threat Intelligence Integration Center will be the clearinghouse for collaborative offensive and defensive work performed by the FBI, the National Security Agency and the Department of Homeland Security.

February 9, 2015
By Sandra Jontz
Pat Hickey, an engineer with Galois Incorporated in Portland, Oregon, prepares to fly a mini drone with software rewritten to make it invulnerable to hackers. It is part of the DARPA-funded High-Assurance Cyber Military Systems. By Sandra Jontz

In case you missed it, CBS’s newsmagazine "60 Minutes" this weekend featured a segment with Dan Kaufman, director of the Information Innovation Office (I2O) for DARPA, who talked about the office’s efforts to outsmart hackers, sex traffickers and those seeking to do harm to the United States.

February 5, 2014
By Sandra Jontz
CNO Adm. Jonathan Greenert, USN, speaks at the Naval Future Force Science and Technology Expo in Washington, D.C. on February 4.

The technological lead the U.S. military has over its adversaries could be a fleeting one as repeated budgetary cuts have bled funding from research and development coffers while rivals grew their technology prowess, offers Adm. Jonathan Greenert, USN, the Navy’s top military officer.

January 29, 2015
By Maryann Lawlor

A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.

January 14, 2015
By Sandra Jontz

President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough. 

December 17, 2014
By Sandra Jontz

Sensational data breaches such as the recent hacking of Sony Pictures Entertainment, in which employees’ personal information such as Social Security numbers, salary details and emails not only were stolen but publicly disseminated, make for great headlines and capture people’s attention—mainly because the public can relate to the breaches. The headline-grabbing attack leaves people thinking that this could happen to them.

December 15, 2014
By Sandra Jontz

The Defense Information Systems Agency (DISA) has released a draft of suggestions and recommended revisions to its cloud computing security requirements guide (SRG), which documents the agency’s cloud security requirements for the Defense Department. When accepted, the new SRG would supersede and rescind the previously published cloud security model.

January 1, 2015
By Robert K. Ackerman
A soldier with the 3rd Infantry Division monitors activity from an unmanned aerial vehicle. Warfighters and decision makers may have access to better information more rapidly if the intelligence community is able to realize its goal of an intelligence Internet of Things.

The U.S. intelligence community is moving toward a hypernetwork of sensors and data collectors that ultimately will constitute an Internet of Things for the community and its customers. If it is successful, the intelligence community would have more data, processed into more knowledge, available more quickly and with greater fidelity for operators and decision makers.

January 1, 2015
By Lt. Col. William A. Barnes, USMC

While a more secure cyberspace will emerge through an evolutionary process, the U.S. government must take immediate action to influence the rate of change.

January 1, 2015
By George I. Seffers
The U.S. Navy program executive office that supports the V-22 and myriad other aircraft is learning to cope with the cyber vulnerabilities of its networked platforms.

For the U.S. Defense Department, the Internet of Things means that everything—battlefield uniforms, office thermostats and major weapon systems, for example—are networked, providing tremendous amounts of data for situational awareness while also preventing challenges for cybersecurity and data storage and analysis.

January 1, 2015
By Sandra Jontz

The Internet of Things, the latest iteration of the overarching dream of an omnipresent network architecture, offers an uncertain future in both opportunities and challenges. That uncertainty is growing as the network concept itself expands in scope and reach.

December 1, 2014
By Rita Boland

The U.S. Army has established a Cyber Chief Information Officer Focal within the acquisition community, responding to the ever-expanding role cyber now has in the service branch.

Pages