Cybersecurity

December 1, 2014
By Sandra Jontz

The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.

December 1, 2014
By Rita Boland
A tactical operations center monitors an NIE. Securing cyber capabilities, starting in the laboratory then extending to the field, is a priority for the U.S. Army.

Cyber is becoming more critical in battle every day, and the U.S. Army is adjusting its Network Integration Evaluation to reflect that reality. The service branch is introducing new digital features to the training event from the laboratory to the field.

December 1, 2014
By George I. Seffers
 Adm. Michael Rogers, USN, NSA director and commander, U.S. Cyber Command, predicts an attempted destructive attack affecting critical infrastructure networks during his tenure as commander.

Adm. Michael Rogers, USN, who leads both the National Security Agency and U.S. Cyber Command, predicts a damaging attack to critical infrastructure networks within the coming years. If an attack happens, the agency and Cyber Command will coordinate a response along with other government agencies and potentially the private sector organizations that own many of the networks.

December 1, 2014
By George I. Seffers

The U.S. Defense Information Systems Agency is being tasked with an operational role in the cyber domain, namely network defense. The new role creates a formal relationship between the agency, U.S. Cyber Command and the military services; integrates network operations and defense; and should ultimately improve security.

October 29, 2014
George I. Seffers

The Defense Department is expected very soon to release a new policy revising the role DISA plays in brokering cloud services. The changes are designed to speed cloud service acquisitions. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.

October 16, 2014
By Sandra Jontz

Might the recurring data breaches plaguing one large retailer after another be a dress rehearsal for a catastrophic attack that could cripple, if not destroy, the United States and its critical infrastructure? The doomsday rhetoric presented by cybersecurity experts at an issue forum Thursday hosted by the Fairfax County Chamber of Commerce, while not so calamitous, served as a wake-up call to the enduring cybersecurity vulnerabilities.

September 17, 2014
By Rita Boland

Strong credentials that people trust will unlock new government and private sector activities. That was the message this morning from Jeremy Grant, senior executive adviser, National Strategy for Trusted Identities in Cyberspace (NSTIC).

April 23, 2014
By Matthew Smith

Whether a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a little help navigating the cumbersome and technical systems. This snapshot features pointers to clarify existing guidance and help organizations manage cybersecurity risk.

March 1, 2014
By George Kamis
Electrical transmission towers and lines carry power across Oregon from the Dalles Dam on the Columbia River. The nation’s critical infrastructure increasingly may be vulnerable to attack through supervisory control and data acquisition (SCADA) systems.

The nation’s critical infrastructure and industrial-control systems have become such potential high-value targets for terrorists that their vulnerability threatens the fabric of society. And, as they increase in both importance and vulnerability, these systems cannot be protected using conventional information security measures.

October 28, 2013
By Henry S. Kenyon

Information technology and communications companies doing business with the federal government may want to look at the Preliminary Cybersecurity Framework being released for public comment on October 29. The framework, which is a part of President Obama’s executive order for Improving Critical Infrastructure, outlines a series of voluntary steps that organizations can take to improve their network security.

October 10, 2013
By Dr. Scott A. Wells

Dr. Scott Wells, co-founder and chief architect of the Social Media Security Professional (SMSP) certification, Ultimate Knowledge Institute, shares some little-known facts about the threats social media pose to organizations and individuals.

October 10, 2013

Think you know your way around the internet?  Even the most seasoned web surfer makes mistakes, and new phishing and linkjacking techniques pop up all the time. This quiz will help you identify and address your own security weaknesses.

October 10, 2013
By Patrick J. Kelly, CISSP

You may be away from the office, but you should never take a vacation from cybersecurity. Keep these tips from Patrick J. Kelly in mind on your next trip.

October 3, 2013
By Rachel Lilly

Would you rather be stuck in an elevator for 24 hours or have your network hacked? According to a new survey, 71 percent of government information technology decision makers think the elevator is a more appealing choice. But improving security still ranks second to the most important technology goal in the coming year—reducing costs.

October 1, 2013
By Dr. Ernest McDuffie

This is an important question for a number of reasons. Popular media often talk about the growing shortage of skilled cybersecurity workers needed to fill critical open positions both in government and the private sector. This is true, but employers need specific details on the work force so they can make informed decisions about whom to hire and potential employees need to know what to study to position themselves to be hired.

August 21, 2013
By Henry Kenyon

As a part of its ongoing efforts to protect critical national infrastructure, the Obama administration has been actively working on making government computer networks more robust and resistant to cyber attack. To do this, the White House has looked internally at federal agencies to put into place new metrics and policies to improve their security stance and externally, reaching out to foreign governments to set up international accords on cyber espionage, a top administration official said.
 

June 27, 2013
By George I. Seffers

Cyber Symposium 2013 Online Show Daily, Day 3

Gen. Keith Alexander, USA, who directs the National Security Agency (NSA) and commands U.S. Cyber Command, wrapped up the final day of the AFCEA International Cyber Symposium with a strongly-worded defense of the U.S. intelligence community, which is under fire following recently-leaked documents concerning the collection of data on the online activities of ordinary citizens in the United States and abroad. The general deviated from the topic of cyber long enough to address the controversy.

August 3, 2012
By Beverly Schaeffer

What you CAN'T see CAN hurt you. In this case, it's wireless intrusion by unauthorized devices. The U.S. Departments of Homeland Security and Defense are hot on the trail to ramp up detection and amp up protection.

August 2012
By Rita Boland, SIGNAL Magazine

The Defense Information Systems Agency's Host-Based Security System is evolving to handle today's wide range and high number of cyberthreats as well as to accommodate the prevalence of emerging mobile platforms. With a new contract in place, the experts who employ the system to keep networks safe will train more often in realistic scenarios, preparing them for attacks that would disrupt operations.

August 2012
By Max Cacas, SIGNAL Magazine

A significant modernization effort underway across the national electric grid is seeking a balance between strong cybersecurity capabilities and affordable protections across the sector.

Pages