Would you rather be stuck in an elevator for 24 hours or have your network hacked? According to a new survey, 71 percent of government information technology decision makers think the elevator is a more appealing choice. But improving security still ranks second to the most important technology goal in the coming year—reducing costs.
This is an important question for a number of reasons. Popular media often talk about the growing shortage of skilled cybersecurity workers needed to fill critical open positions both in government and the private sector. This is true, but employers need specific details on the work force so they can make informed decisions about whom to hire and potential employees need to know what to study to position themselves to be hired.
As a part of its ongoing efforts to protect critical national infrastructure, the Obama administration has been actively working on making government computer networks more robust and resistant to cyber attack. To do this, the White House has looked internally at federal agencies to put into place new metrics and policies to improve their security stance and externally, reaching out to foreign governments to set up international accords on cyber espionage, a top administration official said.
Cyber Symposium 2013 Online Show Daily, Day 3
Gen. Keith Alexander, USA, who directs the National Security Agency (NSA) and commands U.S. Cyber Command, wrapped up the final day of the AFCEA International Cyber Symposium with a strongly-worded defense of the U.S. intelligence community, which is under fire following recently-leaked documents concerning the collection of data on the online activities of ordinary citizens in the United States and abroad. The general deviated from the topic of cyber long enough to address the controversy.
What you CAN'T see CAN hurt you. In this case, it's wireless intrusion by unauthorized devices. The U.S. Departments of Homeland Security and Defense are hot on the trail to ramp up detection and amp up protection.
A significant modernization effort underway across the national electric grid is seeking a balance between strong cybersecurity capabilities and affordable protections across the sector.
A new technology aimed at finding unauthorized wireless devices on critical infrastructure networks could be fielded within a matter of months.
The Defense Information Systems Agency's Host-Based Security System is evolving to handle today's wide range and high number of cyberthreats as well as to accommodate the prevalence of emerging mobile platforms. With a new contract in place, the experts who employ the system to keep networks safe will train more often in realistic scenarios, preparing them for attacks that would disrupt operations.
U.S. officials attending a United Nations meeting this month will try to sway other nations to agree to a set of international norms of behavior in the cyber realm. The U.S. approach is at odds with that preferred by Chinese and Russian officials, who argue that new treaties or international codes are needed for cyber.
Quanterion Solutions Incorporated, Utica, New York, is being awarded a $26,978,011 cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract to provide research and development and non-personal services to include information collection, processing management, analysis, dissemination, and other associated activities necessary in maintaining and operating the Cyber Security Information Analysis Center's scientific and technical information repository. The location of the performance is State University of New York Institute of Technol
Sandia National Laboratories is actively seeking partners to conduct research in the newly opened Cybersecurity Technologies Research Laboratory (CTRL). The CTRL offers the capability to run experiments and freely discuss a wide range of cyber research issues.
In the world of cybersecurity, the problem is not the threat to, but the vulnerability of, the Internet to breaches. The question is whether this reality can be conveyed successfully to the populace. What do you think is the key to solving these kinds information-age challenges?
EmeSec Incorporated, Reston, Virginia, recently announced that it has been awarded a $1.3 million follow-on contract with the U.S. Air Force Medical Services (AFMS) Office of the Chief Information Officer's Information Assurance Division. The company will focus on providing information assurance (IA) engineering services for a variety of systems and applications supporting 74 Air Force sites. Additionally, the company will deliver certification and accreditation service support.
Although outside adversaries constantly attempt to gain access to U.S. Defense Department networks, cybersecurity leaders within the Marine Corps agree that internal user errors and attempts to skirt security measures pose the biggest threat.
Military communications officials struggle with the temptation to ignore warfighters' unauthorized use of cutting-edge mobile devices. It's not always easy to enforce the U.S. military's rules on the use of mobile devices, said John Wilcox, U.S. Special Operations Command.
Amazing anecdotes kept the audience entertained during the lunch session at the AFCEA International Homeland Security Conference. The experts were speaking about a serious subject: cyberwar. But the stories about their hands-on experience in learning how to fight cyberwars, how they've fought cyberthreats and what they believe is needed to prepare future cyberwarriors kept conference attendees enthralled.
In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day. AFCEA International Homeland Security Conference, panelist Tim Kelleher, vice president of professional services, BlackRidge Technology, shared details about his company's approach to stopping cybermarauders in their recon tracks.
Although not claiming victory, the DHS has made some serious headway in improving cybersecurity, according to panelists discussing the topic at the DHS 2012 Information Technology Industry Day in Washington, D.C. Experts said the threats have not disappeared but rather have changed, and various DHS agencies have been learning how to better handle them.
Imitation is the sincerest form of flattery, but that's not always the case in cyberspace-where malicious website impostors steal vital data from legit site users.
From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are 5 resolutions federal agencies should make.