Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Cybersecurity

Quaterion Solutions Awarded Cyber Security Contract

June 28, 2012
By George Seffers

Quanterion Solutions Incorporated, Utica, New York, is being awarded a $26,978,011 cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract to provide research and development and non-personal services to include information collection, processing management, analysis, dissemination, and other associated activities necessary in maintaining and operating the Cyber Security Information Analysis Center's scientific and technical information repository. The location of the performance is State University of New York Institute of Technology, Utica. Electronic Systems Group, Offutt Air Force Base, Nebraska, is the contracting activity.

National Lab Seeks Cybersecurity Research Partnerships

June 18, 2012

Sandia National Laboratories is actively seeking partners to conduct research in the newly opened Cybersecurity Technologies Research Laboratory (CTRL). The CTRL offers the capability to run experiments and freely discuss a wide range of cyber research issues.

Forewarned, but Not Forearmed, Against Cyberthreats

June 8, 2012
By Beverly Schaeffer

In the world of cybersecurity, the problem is not the threat to, but the vulnerability of, the Internet to breaches. The question is whether this reality can be conveyed successfully to the populace. What do you think is the key to solving these kinds information-age challenges?

EmeSec Awarded U.S. Air Force Cybersecurity Conract

April 30, 2012
By George Seffers

EmeSec Incorporated, Reston, Virginia, recently announced that it has been awarded a $1.3 million follow-on contract with the U.S. Air Force Medical Services (AFMS) Office of the Chief Information Officer's Information Assurance Division. The company will focus on providing information assurance (IA) engineering services for a variety of systems and applications supporting 74 Air Force sites. Additionally, the company will deliver certification and accreditation service support. EmeSec will perform risk-management and information security controls evaluation and technical testing to bolster AFMS' security posture. Additionally, the company will manage an IA Engineering Lab as it ascertains real and potential vulnerabilities in procedures, design, operating systems, hardware and software that may expose AFMS to security breaches.

Internal Dangers Pose Biggest Cybersecurity Threat to Marines

March 30, 2012
By Rachel Eisenhower

Although outside adversaries constantly attempt to gain access to U.S. Defense Department networks, cybersecurity leaders within the Marine Corps agree that internal user errors and attempts to skirt security measures pose the biggest threat.

Turning a Blind Eye to Unauthorized Mobile Devices

March 29, 2012
By George Seffers

Military communications officials struggle with the temptation to ignore warfighters' unauthorized use of cutting-edge mobile devices. It's not always easy to enforce the U.S. military's rules on the use of mobile devices, said John Wilcox, U.S. Special Operations Command.

Cybersecurity Tactics Must be Overhauled

February 29, 2012
By Maryann Lawlor

Amazing anecdotes kept the audience entertained during the lunch session at the AFCEA International Homeland Security Conference. The experts were speaking about a serious subject: cyberwar. But the stories about their hands-on experience in learning how to fight cyberwars, how they've fought cyberthreats and what they believe is needed to prepare future cyberwarriors kept conference attendees enthralled.

Computers Don Security Cloak

February 29, 2012
By Maryann Lawlor

In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day. AFCEA International Homeland Security Conference, panelist Tim Kelleher, vice president of professional services, BlackRidge Technology, shared details about his company's approach to stopping cybermarauders in their recon tracks.

Agile Cyberthreats Require Flexible Security

February 28, 2012
By Maryann Lawlor

Although not claiming victory, the DHS has made some serious headway in improving cybersecurity, according to panelists discussing the topic at the DHS 2012 Information Technology Industry Day in Washington, D.C. Experts said the threats have not disappeared but rather have changed, and various DHS agencies have been learning how to better handle them.

Oh, What a Tangled Web They Weave...

December 23, 2011
By Beverly Schaeffer

Imitation is the sincerest form of flattery, but that's not always the case in cyberspace-where malicious website impostors steal vital data from legit site users.

Pages

Subscribe to RSS - Cybersecurity