Sandia National Laboratories is actively seeking partners to conduct research in the newly opened Cybersecurity Technologies Research Laboratory (CTRL). The CTRL offers the capability to run experiments and freely discuss a wide range of cyber research issues.
In the world of cybersecurity, the problem is not the threat to, but the vulnerability of, the Internet to breaches. The question is whether this reality can be conveyed successfully to the populace. What do you think is the key to solving these kinds information-age challenges?
EmeSec Incorporated, Reston, Virginia, recently announced that it has been awarded a $1.3 million follow-on contract with the U.S. Air Force Medical Services (AFMS) Office of the Chief Information Officer's Information Assurance Division. The company will focus on providing information assurance (IA) engineering services for a variety of systems and applications supporting 74 Air Force sites. Additionally, the company will deliver certification and accreditation service support.
Although outside adversaries constantly attempt to gain access to U.S. Defense Department networks, cybersecurity leaders within the Marine Corps agree that internal user errors and attempts to skirt security measures pose the biggest threat.
Military communications officials struggle with the temptation to ignore warfighters' unauthorized use of cutting-edge mobile devices. It's not always easy to enforce the U.S. military's rules on the use of mobile devices, said John Wilcox, U.S. Special Operations Command.
Amazing anecdotes kept the audience entertained during the lunch session at the AFCEA International Homeland Security Conference. The experts were speaking about a serious subject: cyberwar. But the stories about their hands-on experience in learning how to fight cyberwars, how they've fought cyberthreats and what they believe is needed to prepare future cyberwarriors kept conference attendees enthralled.
In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day. AFCEA International Homeland Security Conference, panelist Tim Kelleher, vice president of professional services, BlackRidge Technology, shared details about his company's approach to stopping cybermarauders in their recon tracks.
Although not claiming victory, the DHS has made some serious headway in improving cybersecurity, according to panelists discussing the topic at the DHS 2012 Information Technology Industry Day in Washington, D.C. Experts said the threats have not disappeared but rather have changed, and various DHS agencies have been learning how to better handle them.
Imitation is the sincerest form of flattery, but that's not always the case in cyberspace-where malicious website impostors steal vital data from legit site users.
From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are 5 resolutions federal agencies should make.
Thousands of data breaches occur as a result of internal information leakage rather than an outside attack. There is a critical need to further educate government personnel on how to keep sensitive information secure. Guest blogger Prenston Gale weighs in with insight on how to achieve this important goal.
One of the government's premier scientific research institutions is focusing its resources on defending computer systems against cyberattackers. The Sandia National Laboratories has concluded a recent two-day conference on cybersecurity by announcing plans for a new Cyber Engineering Research Institute (CERI) that will have a presence on both Sandia campuses in New Mexico and California.
(ISC)², the not-for-profit information security professional body that administers the Certified Information Systems Security Professional certification, announced this week the winners of its eighth annual U.S. Government Information Security Leadership Awards.
Cybercrime legislation should be technology agnostic to ensure technological advances do not make the laws obsolete, says James A. Baker, deputy attorney general for the U.S. Justice Department. Baker testified before the Senate Judiciary Committee during a September 7 hearing on updating the Computer Fraud and Abuse Act to combat emerging cyberthreats.
The U.S. Defense Department faces many hurdles in its effort to protect and defend government computer networks. According to an unclassified version of a previously issued classified report from the U.S. Government Accountability Office (GAO), several cyberspace capability gaps exist.
The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.
In an era of social media and WikiLeaks, information assurance is critical to the mission of the U.S. Marine Corps. And Brig. Gen. Kevin Nally, USMC, chief information technology officer, has his hands full ensuring that information flows smoothly and securely throughout the service.
PACOM has the overarching responsibility for ensuring security in the Asia-Pacific region. The organization's commander offers that if PACOM can get its five focus areas right, it will have achieved its goals and enable it to focus on other challenges. What's the ideal future scenario? Read the complete interview and share your input.
In less than 30 days, the Defense Department will dish out 11 prizes for innovative solutions to real-world challenges facing digital forensics examiners. And it's not too late to join the fight against cyber crime. Submissions for the 2010 Defense Department Cyber Crime Center (DC3) Digital Forensics Challenge will be accepted until November 2.
Kratos Defense & Security Solutions Incorporated recently announced that it has received a U.S. Navy services contract to perform information technology, information assurance and cybersecurity services supporting the Pacific Region. The contract is valued at $8 million if all options are exercised.