The United Kingdom plans to undertake the monumental task of restructuring its defense forces, equipping them to face current and future challenges more effectively. Do its plans thus far adequately address the major threats? Or, has it failed to focus more on specific contingencies? Share you ideas and suggestions here.
SRC Incorporated recently received a contract from the Department of Homeland Security's Immigration and Customs Enforcement (DHS-ICE) agency with a potential value of nearly $42 million to establish and maintain a Security Operations Center to help protect critical information technology infrastructure. This contract will enable ICE to monitor its information technology assets 24 hours a day and evaluate and respond to cyber security threats. SRC will lead a team to provide innovative cybersecurity solutions, process improvement strategies and best-of-breed technologies for ICE.
SRC Incorporated, formerly Syracuse Research Corporation, announced it has been awarded a contract from the Department of Homeland Security's Immigration and Customs Enforcement investigative agency with a potential value of nearly $42 million to establish and maintain a Security Operations Center to help protect critical information technology infrastructure. SRC will lead a team to provide innovative cybersecurity solutions, process improvement strategies and best-of-breed technologies.
No matter how much we think technological solutions will be the panacea for all our information assurance concerns, there's still the human factor to consider, writes Linton Wells II in this month's Incoming column, "Uneasy Sleep in a Golden Age":
ManTech International Corporation announced today that it received a new contract to support the U.S. Department of Agriculture Office of the Chief Information Officer, Agriculture Security Operations Center. ManTech will provide continous incident handling and strategic support to help detect and report malicious cyber activities on the agency's enterprise information infrastructure. The contract is estimated to be worth nearly $11 million.
A different cybersecurity culture needs to be diffused throughout the Defense Department. It will have to view cyberdefenses not as a bandage to be selectively applied to a patchwork of applications. The new cybersecurity must become an inseparable feature of every computer technology that enables our operations.
Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.
The nation's largest, simultaneous high school cybersecurity competition is back, and students across the nation have until October 8 to sign up. Winners will walk away from CyberPatriot III with scholarships and the knowledge of how to defend computer networks against real-life threats.
The U.S. Defense Department must secure the cyber domain to protect and defend its own information and U.S. citizens, Gen. Keith B. Alexander, USA, commander of U.S. Cyber Command said today during the opening address of LandWarNet 2010. Gen. Alexander also serves as the director of the National Security Agency. "Every link and system has vulnerabilities that we have to defend," he stated.
Paul Strassmann offers his insights on network virtualization as an answer to cyber security concerns about the proliferation of things contributing to the "attack surface," such as networks, circuits and computers.
Paul Strassmann continues from last week's "Gentlemen Do Not Open Attachments" with illustrations of how to implement safe social computing using virtual computers.
"At the end of the day, it's about the warfighter."--Lt. Gen. Dennis Vis, USA, director, C4 systems, Joint Staff
"A lot of our warfare in the future is going to be electronic. Our enemies are going to try to take us down either through our Defense Department systems or through other systems."--Lisa N. Wolford, founder, president and CEO of CSSS.NET
"Stop pontificating about the rules and be an example." --Marc Sachs Verizon says to goverment agencies about cybersecurity practices
No, I'm not talking about the classic Marilyn Monroe film; I'm talking about AFCEA's Homeland Security Conference, going on this Wednesday and Thursday. The theme is "DHS: The 7-Year Itch-Renewing the Commitment." The event will cover such topics as cybersecurity, securing social media, transparency, identity management, information and intelligence sharing, and more.
"Ignorance is our biggest vulnerability [in the cyber domain]." --Vice Adm. Carl Mauney, USN, deputy CO, STRATCOM
Although the U.S. Navy has been in the cyber arena for many years, today the service officially moved into the operational cyber domain as Vice Adm. Barry McCullough, USN, took command of the U.S. Fleet Cyber Command/U.S. 10th Fleet.
Cyber denizens meet on DEFStar-an innovative social media site geared toward government and military.
President Obama has named Howard A. Schmidt the new White House Cybersecurity Coordinator.
The DHS has instituted a new job application process for cybersecurity positions. The good news? It's free of KSAs. Right now the agency is hosting a virtual job fair for those interested. Applicants no longer have to worry about KSAs or a points system; they simply submit cover letters and résumés, which are reviewed by hiring managers. DHS officials will then contact candidates of interest to invite them to a private interview event.