Cybersecurity

March 26, 2010
By Katie Packard

"A lot of our warfare in the future is going to be electronic. Our enemies are going to try to take us down either through our Defense Department systems or through other systems."--Lisa N. Wolford, founder, president and CEO of CSSS.NET

February 25, 2010

"Stop pontificating about the rules and be an example." --Marc Sachs Verizon says to goverment agencies about cybersecurity practices

February 22, 2010

No, I'm not talking about the classic Marilyn Monroe film; I'm talking about AFCEA's Homeland Security Conference, going on this Wednesday and Thursday. The theme is "DHS: The 7-Year Itch-Renewing the Commitment." The event will cover such topics as cybersecurity, securing social media, transparency, identity management, information and intelligence sharing, and more.

February 2, 2010
By Maryann Lawlor

"Ignorance is our biggest vulnerability [in the cyber domain]." --Vice Adm. Carl Mauney, USN, deputy CO, STRATCOM

January 29, 2010

Although the U.S. Navy has been in the cyber arena for many years, today the service officially moved into the operational cyber domain as Vice Adm. Barry McCullough, USN, took command of the U.S. Fleet Cyber Command/U.S. 10th Fleet.

January 27, 2010
By Beverly Schaeffer

Cyber denizens meet on DEFStar-an innovative social media site geared toward government and military.

December 23, 2009
By Katie Packard

President Obama has named Howard A. Schmidt the new White House Cybersecurity Coordinator.

December 15, 2009
By Henry Kenyon

The DHS has instituted a new job application process for cybersecurity positions. The good news? It's free of KSAs. Right now the agency is hosting a virtual job fair for those interested. Applicants no longer have to worry about KSAs or a points system; they simply submit cover letters and résumés, which are reviewed by hiring managers. DHS officials will then contact candidates of interest to invite them to a private interview event.

December 14, 2009
By Katie Packard

February may seem far away, but it will be here in no time at all. Make plans now to attend two great events: the West 2010 Conference in San Diego and the Homeland Security Conference in Washington, D.C.

December 3, 2009
By Henry Kenyon

The second and final day of AFCEA's SOLUTIONS Series event focusing on cyberspace demonstrated that the military and government are still perplexed by this new domain.

December 2, 2009
By Henry Kenyon

Two leaders in the intelligence realm shared their main concerns about security and cyberspace to a packed auditorium at the SOLUTIONS Series.

December 2, 2009
By Henry Kenyon

Tracks panelists at SOLUTIONS discuss the foundational issues, current initiatives and long-term plans for cybersecurity.

December 2, 2009
By Henry Kenyon

Sherri Ramsay, director of the NSA's Central Security Service Threat Operations Center, says that the intersection of cyber, national and economic security has changed the way her organization interacts with industry.

November 5, 2009
By Robert K. Ackerman

The information technology arena is experiencing large tectonic shifts that are directly affecting requirements for cybersecurity. Transitions-from physical to virtual; from the premise to the cloud; from more formal networks to social networks-will have their counterparts in new security requirements and approaches.

November 5, 2009
By Robert K. Ackerman

Government needs to "think flat' and create a cybersecurity architecture that emphasizes a peering structure rather than a vertical architecture.

July 16, 2009
By H. Mosher

Joe Mazzafro, writing over at the MAZZ-INT blog for the AFCEA Intelligence community, explores the difficulty in finding a person who is both qualified and willing to be the new "Cyber Czar." "Given these circumstances I just don't see many high profile personalities attracted to being the third or fourth choice for a position that lacks authority, reports to a Deputy National Security Adviser and must operate in the shadow of DIRNSA," he writes.

April 23, 2009
By Henry Kenyon

Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought.

Pages