The notion of nefarious scientists re-engineering the genetics of living organisms to then weaponize their new specimens has some researchers jostling for the upper hand, including those at the U.S. Defense Department’s main research agency.
The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.
Northrop Grumman Space Mission Systems Corp., San Diego, has been awarded a $6,926,501 modification (P00094) to previously awarded contract FA8726-09-C-0010 for risk management framework. Contractor will meet cybersecurity requirements using the new Risk Management Framework. Work will be performed in San Diego, and is expected to be complete by June 22, 2015. This award is the result of a sole-source acquisition.
As cybersecurity defenses improve, so do the breaching tactics and methods by adversaries driven to hack into commercial and government networks. And they are doing so at alarming speeds, outpacing defense efforts.
The White House this week announced that it is creating a federal agency to keep tabs on and counter cybersecurity threats against the United States. The Cyber Threat Intelligence Integration Center will be the clearinghouse for collaborative offensive and defensive work performed by the FBI, the National Security Agency and the Department of Homeland Security.
In case you missed it, CBS’s newsmagazine "60 Minutes" this weekend featured a segment with Dan Kaufman, director of the Information Innovation Office (I2O) for DARPA, who talked about the office’s efforts to outsmart hackers, sex traffickers and those seeking to do harm to the United States.
The technological lead the U.S. military has over its adversaries could be a fleeting one as repeated budgetary cuts have bled funding from research and development coffers while rivals grew their technology prowess, offers Adm. Jonathan Greenert, USN, the Navy’s top military officer.
A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.
President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough.
Sensational data breaches such as the recent hacking of Sony Pictures Entertainment, in which employees’ personal information such as Social Security numbers, salary details and emails not only were stolen but publicly disseminated, make for great headlines and capture people’s attention—mainly because the public can relate to the breaches. The headline-grabbing attack leaves people thinking that this could happen to them.
The Defense Information Systems Agency (DISA) has released a draft of suggestions and recommended revisions to its cloud computing security requirements guide (SRG), which documents the agency’s cloud security requirements for the Defense Department. When accepted, the new SRG would supersede and rescind the previously published cloud security model.
The U.S. intelligence community is moving toward a hypernetwork of sensors and data collectors that ultimately will constitute an Internet of Things for the community and its customers. If it is successful, the intelligence community would have more data, processed into more knowledge, available more quickly and with greater fidelity for operators and decision makers.
While a more secure cyberspace will emerge through an evolutionary process, the U.S. government must take immediate action to influence the rate of change.
For the U.S. Defense Department, the Internet of Things means that everything—battlefield uniforms, office thermostats and major weapon systems, for example—are networked, providing tremendous amounts of data for situational awareness while also preventing challenges for cybersecurity and data storage and analysis.
The Internet of Things, the latest iteration of the overarching dream of an omnipresent network architecture, offers an uncertain future in both opportunities and challenges. That uncertainty is growing as the network concept itself expands in scope and reach.
The U.S. Army has established a Cyber Chief Information Officer Focal within the acquisition community, responding to the ever-expanding role cyber now has in the service branch.
Many information technology organizations are taking a different approach to cybersecurity that radically reduces the time to detect and respond to attempted cyber attacks.
A new program aims to help veterans seeking work in the field of cybersecurity earn certifications. "The scholarship opens doors for veterans seeking continued service to their country ... and at the same time helps to fill the growing need for cybersecurity professionals."
Cyber is becoming more critical in battle every day, and the U.S. Army is adjusting its Network Integration Evaluation to reflect that reality. The service branch is introducing new digital features to the training event from the laboratory to the field.
The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.