Cybersecurity

February 24, 2015
By Maryann Lawlor

The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.

February 20, 2015

Northrop Grumman Space Mission Systems Corp., San Diego, has been awarded a $6,926,501 modification (P00094) to previously awarded contract FA8726-09-C-0010 for risk management framework. Contractor will meet cybersecurity requirements using the new Risk Management Framework. Work will be performed in San Diego, and is expected to be complete by June 22, 2015. This award is the result of a sole-source acquisition.

February 20, 2015
By Sandra Jontz
A cyber Joint Users Interoperability Communications Exercise, or JUICE, takes place at Aberdeen Proving Ground, Maryland.

As cybersecurity defenses improve, so do the breaching tactics and methods by adversaries driven to hack into commercial and government networks. And they are doing so at alarming speeds, outpacing defense efforts. 

February 11, 2015
By Sandra Jontz

The White House this week announced that it is creating a federal agency to keep tabs on and counter cybersecurity threats against the United States. The Cyber Threat Intelligence Integration Center will be the clearinghouse for collaborative offensive and defensive work performed by the FBI, the National Security Agency and the Department of Homeland Security.

February 9, 2015
By Sandra Jontz
Pat Hickey, an engineer with Galois Incorporated in Portland, Oregon, prepares to fly a mini drone with software rewritten to make it invulnerable to hackers. It is part of the DARPA-funded High-Assurance Cyber Military Systems. By Sandra Jontz

In case you missed it, CBS’s newsmagazine "60 Minutes" this weekend featured a segment with Dan Kaufman, director of the Information Innovation Office (I2O) for DARPA, who talked about the office’s efforts to outsmart hackers, sex traffickers and those seeking to do harm to the United States.

February 5, 2014
By Sandra Jontz
CNO Adm. Jonathan Greenert, USN, speaks at the Naval Future Force Science and Technology Expo in Washington, D.C. on February 4.

The technological lead the U.S. military has over its adversaries could be a fleeting one as repeated budgetary cuts have bled funding from research and development coffers while rivals grew their technology prowess, offers Adm. Jonathan Greenert, USN, the Navy’s top military officer.

January 29, 2015
By Maryann Lawlor

A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.

January 14, 2015
By Sandra Jontz

President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough. 

December 17, 2014
By Sandra Jontz

Sensational data breaches such as the recent hacking of Sony Pictures Entertainment, in which employees’ personal information such as Social Security numbers, salary details and emails not only were stolen but publicly disseminated, make for great headlines and capture people’s attention—mainly because the public can relate to the breaches. The headline-grabbing attack leaves people thinking that this could happen to them.

December 15, 2014
By Sandra Jontz

The Defense Information Systems Agency (DISA) has released a draft of suggestions and recommended revisions to its cloud computing security requirements guide (SRG), which documents the agency’s cloud security requirements for the Defense Department. When accepted, the new SRG would supersede and rescind the previously published cloud security model.

January 1, 2015
By Robert K. Ackerman
A soldier with the 3rd Infantry Division monitors activity from an unmanned aerial vehicle. Warfighters and decision makers may have access to better information more rapidly if the intelligence community is able to realize its goal of an intelligence Internet of Things.

The U.S. intelligence community is moving toward a hypernetwork of sensors and data collectors that ultimately will constitute an Internet of Things for the community and its customers. If it is successful, the intelligence community would have more data, processed into more knowledge, available more quickly and with greater fidelity for operators and decision makers.

January 1, 2015
By Lt. Col. William A. Barnes, USMC

While a more secure cyberspace will emerge through an evolutionary process, the U.S. government must take immediate action to influence the rate of change.

January 1, 2015
By George I. Seffers
The U.S. Navy program executive office that supports the V-22 and myriad other aircraft is learning to cope with the cyber vulnerabilities of its networked platforms.

For the U.S. Defense Department, the Internet of Things means that everything—battlefield uniforms, office thermostats and major weapon systems, for example—are networked, providing tremendous amounts of data for situational awareness while also preventing challenges for cybersecurity and data storage and analysis.

January 1, 2015
By Sandra Jontz

The Internet of Things, the latest iteration of the overarching dream of an omnipresent network architecture, offers an uncertain future in both opportunities and challenges. That uncertainty is growing as the network concept itself expands in scope and reach.

December 1, 2014
By Rita Boland

The U.S. Army has established a Cyber Chief Information Officer Focal within the acquisition community, responding to the ever-expanding role cyber now has in the service branch.

November 17, 2014
By Jay Aceto

Many information technology organizations are taking a different approach to cybersecurity that radically reduces the time to detect and respond to attempted cyber attacks.

November 17, 2014
By Sandra Jontz

A new program aims to help veterans seeking work in the field of cybersecurity earn certifications. "The scholarship opens doors for veterans seeking continued service to their country ... and at the same time helps to fill the growing need for cybersecurity professionals."

December 1, 2014
By Sandra Jontz

The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.

December 1, 2014
By Rita Boland
A tactical operations center monitors an NIE. Securing cyber capabilities, starting in the laboratory then extending to the field, is a priority for the U.S. Army.

Cyber is becoming more critical in battle every day, and the U.S. Army is adjusting its Network Integration Evaluation to reflect that reality. The service branch is introducing new digital features to the training event from the laboratory to the field.

December 1, 2014
By George I. Seffers
 Adm. Michael Rogers, USN, NSA director and commander, U.S. Cyber Command, predicts an attempted destructive attack affecting critical infrastructure networks during his tenure as commander.

Adm. Michael Rogers, USN, who leads both the National Security Agency and U.S. Cyber Command, predicts a damaging attack to critical infrastructure networks within the coming years. If an attack happens, the agency and Cyber Command will coordinate a response along with other government agencies and potentially the private sector organizations that own many of the networks.

Pages