Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Cybersecurity

GSA Awards Nearly $42 Million to SRC for Cyber Support

September 3, 2010
By George Seffers

SRC Incorporated, formerly Syracuse Research Corporation, announced it has been awarded a contract from the Department of Homeland Security's Immigration and Customs Enforcement investigative agency with a potential value of nearly $42 million to establish and maintain a Security Operations Center to help protect critical information technology infrastructure. SRC will lead a team to provide innovative cybersecurity solutions, process improvement strategies and best-of-breed technologies.

We're Only Human

September 1, 2010
By H. Mosher

No matter how much we think technological solutions will be the panacea for all our information assurance concerns, there's still the human factor to consider, writes Linton Wells II in this month's Incoming column, "Uneasy Sleep in a Golden Age":

In the end, it all comes down to people. When Lou Gerstner was chief executive officer of IBM, he asked how he would know if his organization had a good information assurance program. The answer was: "Walk down the hall. Find a random employee. Ask them three questions: 'Would you know if your computer was being interfered with?' If yes, 'Would you know whom to call to get support?' If yes, 'Would you care enough to call?'" Unless you can answer "yes" to all three of these questions for each of your employees, you can spend all you want on technology and still fail on the people side.

As the gap between functionality and security continues to grow, how can organizations develop security policies that people will understand and follow?

ManTech to Support Cyber Security Operations Center for the U.S. Agriculture Department

September 1, 2010
By George Seffers

ManTech International Corporation announced today that it received a new contract to support the U.S. Department of Agriculture Office of the Chief Information Officer, Agriculture Security Operations Center. ManTech will provide continous incident handling and strategic support to help detect and report malicious cyber activities on the agency's enterprise information infrastructure. The contract is estimated to be worth nearly $11 million.

How to Improve Cyberdefenses at the DoD

August 23, 2010
By Paul Strassmann

A different cybersecurity culture needs to be diffused throughout the Defense Department. It will have to view cyberdefenses not as a bandage to be selectively applied to a patchwork of applications. The new cybersecurity must become an inseparable feature of every computer technology that enables our operations.

Cyberdefense and DoD Culture

August 23, 2010
By Paul Strassmann

Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.

Competition Offers Teens Insight into Cyberdefense

August 18, 2010
By Rachel Eisenhower

The nation's largest, simultaneous high school cybersecurity competition is back, and students across the nation have until October 8 to sign up. Winners will walk away from CyberPatriot III with scholarships and the knowledge of how to defend computer networks against real-life threats.

Cybersecurity Is Evolving, Increasingly Important

August 3, 2010
By Rita Boland

The U.S. Defense Department must secure the cyber domain to protect and defend its own information and U.S. citizens, Gen. Keith B. Alexander, USA, commander of U.S. Cyber Command said today during the opening address of LandWarNet 2010. Gen. Alexander also serves as the director of the National Security Agency. "Every link and system has vulnerabilities that we have to defend," he stated.

Guest Post: Network Virtualization

June 9, 2010
By Paul Strassmann

Paul Strassmann offers his insights on network virtualization as an answer to cyber security concerns about the proliferation of things contributing to the "attack surface," such as networks, circuits and computers.

Guest Blog: Cases in How to Practice Safe Social Computing

May 25, 2010
By Paul Strassmann

Paul Strassmann continues from last week's "Gentlemen Do Not Open Attachments" with illustrations of how to implement safe social computing using virtual computers.

General Highlights Joint Staff C4 Priorities

May 18, 2010

"At the end of the day, it's about the warfighter."--Lt. Gen. Dennis Vis, USA, director, C4 systems, Joint Staff

Pages

Subscribe to RSS - Cybersecurity