Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Security

Sandia Cyber Technologies Academy Offers Free Courses

May 2, 2014
By George I. Seffers

High school students and teachers get to learn about the world of cybersecurity through Sandia National Laboratories' Cyber Technologies Academy (CTA), which offers free classes for those interested in computer science and cybersecurity.

Boston Marathon Bombing Lessons Learned

April 30, 2014
By George I. Seffers

Intelligence agencies could have investigated more thoroughly and shared information more effectively, but even if they had performed perfectly, they may not have been able to prevent last year's Boston Marathon bombing, according to a report delivered before the Senate Homeland Security and Governmental Affairs Committee.

Joint 
Information Environment 
Logs Successes, 
Faces Snags

May 1, 2014
By Robert K. Ackerman

The Defense Department drive toward its Joint Information Environment is picking up speed as it progresses toward its goal of assimilating military networks across the warfighting realm. Individual services are developing solutions, some of which are targeted for their own requirements, that are being applied to the overarching goal of linking the entire defense environment.

Early successes in Europe have advanced Joint Information Environment (JIE) efforts elsewhere, including the continental United States. Some activities have been accelerated as a result of lessons learned, and they have been implemented ahead of schedule in regions not slated to receive them for months or even years.

However, significant hurdles remain, and not all participants are equally supportive of the effort. Overcoming major cultural challenges may be the most difficult task facing JIE implementation. And, the omnipresent budget constraints facing the entire Defense Department may extend into the JIE, even though it is not officially a program of record.

Senior Defense Department leaders do not hesitate to emphasize the importance of the JIE to future military operations. David DeVries, deputy Defense Department chief information officer (CIO) for information enterprise, describes the JIE as a unifying effort to do “the largest wholesale information technology modernization in the history of the department.”

Lt. Gen. Ronnie D. Hawkins Jr., USAF, director, Defense Information Systems Agency (DISA), avows, “The next type of enterprise that our Defense Department will be postured to utilize in the next conflict—be it kinetic or nonkinetic—the JIE will be an integral part of that environment.”

Computer Security Problems at VA Doubled in Six Years

April 1, 2014
By Sandra Jontz

The Department of Veterans Affairs (VA) remains plagued by decades-old problems of unreliable and vulnerable networks and computer systems, putting the veterans they serve at risk, according to a recent government report. Despite years of documented weaknesses, the VA still has failed to shore up vulnerabilities, according to the Government Accountability Office (GAO) report.

Cyber Warrior Teams Vie for Big Win in CyberPatriot Bout

March 21, 2014
By Sandra Jontz

Middle and high school student teams from 14 states will gather next week for CyberPatriot, a culminating competition in which they will be tested defend computers against cyberattacks.

Open Source Intelligence Offers Crystal Ball Capability

April 1, 2014
By George I. Seffers

Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises.

Cybersecurity Tentacles Entwine Government

March 11, 2014
By George I. Seffers

It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

World Complexity Creates Greatest Challenge

March 10, 2014
By George I. Seffers

The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.

Ramping Up the Cyber Criminal Hunt

March 1, 2014
By George I. Seffers

U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.

NATO Focuses on Terrorist Cyber Exploitation

March 1, 2014
By Robert K. Ackerman

NATO’s efforts to defend against terrorism now are focusing on cyberspace as a tool of terrorists instead of merely as a vulnerability for striking at alliance nations and their critical infrastructure. These efforts cover aspects of cyber exploitation that range from understanding terrorists’ behavior to how they might use social media.

Pages

Subscribe to RSS - Security