Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cybersecurity

New Model Sparks Safeguards to the Grid

August 2012
By Max Cacas, SIGNAL Magazine

A significant modernization effort underway across the national electric grid is seeking a balance between strong cybersecurity capabilities and affordable protections across the sector.

Securing Military Devices

August 2012
By Rita Boland, SIGNAL Magazine

The Defense Information Systems Agency's Host-Based Security System is evolving to handle today's wide range and high number of cyberthreats as well as to accommodate the prevalence of emerging mobile platforms. With a new contract in place, the experts who employ the system to keep networks safe will train more often in realistic scenarios, preparing them for attacks that would disrupt operations.

WildCAT Prowls for Wireless Predators

August 2012
By George I. Seffers, SIGNAL Magazine

A new technology aimed at finding unauthorized wireless devices on critical infrastructure networks could be fielded within a matter of months.

International Cooperation Critical to Cyber Mission

August 2012
By George I. Seffers, SIGNAL Magazine

U.S. officials attending a United Nations meeting this month will try to sway other nations to agree to a set of international norms of behavior in the cyber realm. The U.S. approach is at odds with that preferred by Chinese and Russian officials, who argue that new treaties or international codes are needed for cyber.

Quaterion Solutions Awarded Cyber Security Contract

June 28, 2012
By George Seffers

Quanterion Solutions Incorporated, Utica, New York, is being awarded a $26,978,011 cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract to provide research and development and non-personal services to include information collection, processing management, analysis, dissemination, and other associated activities necessary in maintaining and operating the Cyber Security Information Analysis Center's scientific and technical information repository. The location of the performance is State University of New York Institute of Technology, Utica. Electronic Systems Group, Offutt Air Force Base, Nebraska, is the contracting activity.

National Lab Seeks Cybersecurity Research Partnerships

June 18, 2012

Sandia National Laboratories is actively seeking partners to conduct research in the newly opened Cybersecurity Technologies Research Laboratory (CTRL). The CTRL offers the capability to run experiments and freely discuss a wide range of cyber research issues.

Forewarned, but Not Forearmed, Against Cyberthreats

June 8, 2012
By Beverly Schaeffer

In the world of cybersecurity, the problem is not the threat to, but the vulnerability of, the Internet to breaches. The question is whether this reality can be conveyed successfully to the populace. What do you think is the key to solving these kinds information-age challenges?

EmeSec Awarded U.S. Air Force Cybersecurity Conract

April 30, 2012
By George Seffers

EmeSec Incorporated, Reston, Virginia, recently announced that it has been awarded a $1.3 million follow-on contract with the U.S. Air Force Medical Services (AFMS) Office of the Chief Information Officer's Information Assurance Division. The company will focus on providing information assurance (IA) engineering services for a variety of systems and applications supporting 74 Air Force sites. Additionally, the company will deliver certification and accreditation service support. EmeSec will perform risk-management and information security controls evaluation and technical testing to bolster AFMS' security posture. Additionally, the company will manage an IA Engineering Lab as it ascertains real and potential vulnerabilities in procedures, design, operating systems, hardware and software that may expose AFMS to security breaches.

Internal Dangers Pose Biggest Cybersecurity Threat to Marines

March 30, 2012
By Rachel Eisenhower

Although outside adversaries constantly attempt to gain access to U.S. Defense Department networks, cybersecurity leaders within the Marine Corps agree that internal user errors and attempts to skirt security measures pose the biggest threat.

Turning a Blind Eye to Unauthorized Mobile Devices

March 29, 2012
By George Seffers

Military communications officials struggle with the temptation to ignore warfighters' unauthorized use of cutting-edge mobile devices. It's not always easy to enforce the U.S. military's rules on the use of mobile devices, said John Wilcox, U.S. Special Operations Command.

Pages

Subscribe to RSS - Cybersecurity