Cybersecurity

December 14, 2009
By Katie Packard

February may seem far away, but it will be here in no time at all. Make plans now to attend two great events: the West 2010 Conference in San Diego and the Homeland Security Conference in Washington, D.C.

December 3, 2009
By Henry Kenyon

The second and final day of AFCEA's SOLUTIONS Series event focusing on cyberspace demonstrated that the military and government are still perplexed by this new domain.

December 2, 2009
By Henry Kenyon

Two leaders in the intelligence realm shared their main concerns about security and cyberspace to a packed auditorium at the SOLUTIONS Series.

December 2, 2009
By Henry Kenyon

Tracks panelists at SOLUTIONS discuss the foundational issues, current initiatives and long-term plans for cybersecurity.

December 2, 2009
By Henry Kenyon

Sherri Ramsay, director of the NSA's Central Security Service Threat Operations Center, says that the intersection of cyber, national and economic security has changed the way her organization interacts with industry.

November 5, 2009
By Robert K. Ackerman

The information technology arena is experiencing large tectonic shifts that are directly affecting requirements for cybersecurity. Transitions-from physical to virtual; from the premise to the cloud; from more formal networks to social networks-will have their counterparts in new security requirements and approaches.

November 5, 2009
By Robert K. Ackerman

Government needs to "think flat' and create a cybersecurity architecture that emphasizes a peering structure rather than a vertical architecture.

July 16, 2009
By H. Mosher

Joe Mazzafro, writing over at the MAZZ-INT blog for the AFCEA Intelligence community, explores the difficulty in finding a person who is both qualified and willing to be the new "Cyber Czar." "Given these circumstances I just don't see many high profile personalities attracted to being the third or fourth choice for a position that lacks authority, reports to a Deputy National Security Adviser and must operate in the shadow of DIRNSA," he writes.

April 23, 2009
By Henry Kenyon

Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought.

Pages