The U.S. Defense Department faces many hurdles in its effort to protect and defend government computer networks. According to an unclassified version of a previously issued classified report from the U.S. Government Accountability Office (GAO), several cyberspace capability gaps exist.
The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.
In an era of social media and WikiLeaks, information assurance is critical to the mission of the U.S. Marine Corps. And Brig. Gen. Kevin Nally, USMC, chief information technology officer, has his hands full ensuring that information flows smoothly and securely throughout the service.
PACOM has the overarching responsibility for ensuring security in the Asia-Pacific region. The organization's commander offers that if PACOM can get its five focus areas right, it will have achieved its goals and enable it to focus on other challenges. What's the ideal future scenario? Read the complete interview and share your input.
In less than 30 days, the Defense Department will dish out 11 prizes for innovative solutions to real-world challenges facing digital forensics examiners. And it's not too late to join the fight against cyber crime. Submissions for the 2010 Defense Department Cyber Crime Center (DC3) Digital Forensics Challenge will be accepted until November 2.
Kratos Defense & Security Solutions Incorporated recently announced that it has received a U.S. Navy services contract to perform information technology, information assurance and cybersecurity services supporting the Pacific Region. The contract is valued at $8 million if all options are exercised.
The United Kingdom plans to undertake the monumental task of restructuring its defense forces, equipping them to face current and future challenges more effectively. Do its plans thus far adequately address the major threats? Or, has it failed to focus more on specific contingencies? Share you ideas and suggestions here.
SRC Incorporated recently received a contract from the Department of Homeland Security's Immigration and Customs Enforcement (DHS-ICE) agency with a potential value of nearly $42 million to establish and maintain a Security Operations Center to help protect critical information technology infrastructure. This contract will enable ICE to monitor its information technology assets 24 hours a day and evaluate and respond to cyber security threats. SRC will lead a team to provide innovative cybersecurity solutions, process improvement strategies and best-of-breed technologies for ICE.
SRC Incorporated, formerly Syracuse Research Corporation, announced it has been awarded a contract from the Department of Homeland Security's Immigration and Customs Enforcement investigative agency with a potential value of nearly $42 million to establish and maintain a Security Operations Center to help protect critical information technology infrastructure. SRC will lead a team to provide innovative cybersecurity solutions, process improvement strategies and best-of-breed technologies.
No matter how much we think technological solutions will be the panacea for all our information assurance concerns, there's still the human factor to consider, writes Linton Wells II in this month's Incoming column, "Uneasy Sleep in a Golden Age":
ManTech International Corporation announced today that it received a new contract to support the U.S. Department of Agriculture Office of the Chief Information Officer, Agriculture Security Operations Center. ManTech will provide continous incident handling and strategic support to help detect and report malicious cyber activities on the agency's enterprise information infrastructure. The contract is estimated to be worth nearly $11 million.
A different cybersecurity culture needs to be diffused throughout the Defense Department. It will have to view cyberdefenses not as a bandage to be selectively applied to a patchwork of applications. The new cybersecurity must become an inseparable feature of every computer technology that enables our operations.
Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.
The nation's largest, simultaneous high school cybersecurity competition is back, and students across the nation have until October 8 to sign up. Winners will walk away from CyberPatriot III with scholarships and the knowledge of how to defend computer networks against real-life threats.
The U.S. Defense Department must secure the cyber domain to protect and defend its own information and U.S. citizens, Gen. Keith B. Alexander, USA, commander of U.S. Cyber Command said today during the opening address of LandWarNet 2010. Gen. Alexander also serves as the director of the National Security Agency. "Every link and system has vulnerabilities that we have to defend," he stated.
Paul Strassmann offers his insights on network virtualization as an answer to cyber security concerns about the proliferation of things contributing to the "attack surface," such as networks, circuits and computers.
Paul Strassmann continues from last week's "Gentlemen Do Not Open Attachments" with illustrations of how to implement safe social computing using virtual computers.
"At the end of the day, it's about the warfighter."--Lt. Gen. Dennis Vis, USA, director, C4 systems, Joint Staff
"A lot of our warfare in the future is going to be electronic. Our enemies are going to try to take us down either through our Defense Department systems or through other systems."--Lisa N. Wolford, founder, president and CEO of CSSS.NET
"Stop pontificating about the rules and be an example." --Marc Sachs Verizon says to goverment agencies about cybersecurity practices