Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Security

A New Approach Is Needed to Protect Defense Department Cybersystems

October 1, 2014
By Paul A. Strassmann

Budget cuts and rapidly improving information technology are forcing the U.S. Defense Department to confront increasing cybersecurity demands without commensurate increases in available resources

Combating Terrorism with Next-Generation Mesh Networking

October 1, 2014
By George I. Seffers

U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.

CBP, Maryland Prisons Look to Industry for Cellular Phone Protective Technology

August 21, 2014
By Sandra Jontz

Defense contractor giant Lockheed Martin’s LUMEN technology aims to protect cellular phone users from rogue, spoofing systems.

Some Cyber Attackers Lie Low

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

British Experts Evaluate Protection Needs for Public-
Sector Mobility

September 1, 2014
By Rita Boland

U.K. government entities at various levels are looking into bring-your-own-device policies for their purposes. And while their mandates differ, they all have one factor in common—a need for the right level of security.

Policy Problems Vex Corporate
 Bring Your
 Own Device

September 1, 2014
By Sandra Jontz

The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.

Technology Cost and Complexity Killing U.S.

July 23, 2014
By George I. Seffers

DARPA director describes a global shift in the technology environment that poses a national threat.

National Labs and Industry Partner to Train Critical Infrastructure Cybersecurity Specialists

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory and Los Alamos National Laboratory join Bechtel BNI to train a new class of cyberdefense professionals. The program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry.

Cryptography Advisory Group Addresses NIST Ties to NSA

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

Cyber Operations Centers of Academic Excellence List Expands

July 14, 2014
By George I. Seffers

The National Security Agency has added five schools to the National Centers of Academic Excellence in Cyber Operations Program.

Pages

Subscribe to RSS - Security