The Pentagon’s new cybersecurity strategy for the first time publicly addresses the department’s option to resort to offensive cyberwarfare tactics as a means to safeguard the military’s information networks. The Department of Defense Cyber Strategy, the second in four years, guides the development of the military’s cyber forces.
The U.S. Air Force cyber community is failing, but not all is lost. While some aspects are in dire need of repair or replacement, effective solutions potentially are within reach—if leadership is up to the task.
Panelists at TechNet Land Forces Southwest offered ideas for attracting, training and retaining cyber warriors. Ideas included bringing more women into cyber, simplifying the process for current soldiers who want to transition, and increasing opportunities for career and leadership development.
PACOM has the overarching responsibility for ensuring security in the Asia-Pacific region. The organization's commander offers that if PACOM can get its five focus areas right, it will have achieved its goals and enable it to focus on other challenges. What's the ideal future scenario? Read the complete interview and share your input.
This month, Linton Wells II drew his inspiration for Mission Assurance Moves to the Fore in Cyberspace from Deputy Secretary of Defense William J. Lynn III's recently published article, Defending a New Domain: The Pentagon's Cyberstrategy. Wells summarizes Lynn's strategy points, noting that taken on a whole they have a broader implication than just cyberdefense. It has more to do with mission assurance, he says. But he has a number of concerns, among them: how will the new cyberstrategy be implemented? And how can the private sector do a better job of meeting its requirements?
Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.
Paul Strassmann offers his insights on network virtualization as an answer to cyber security concerns about the proliferation of things contributing to the "attack surface," such as networks, circuits and computers.
Or rather, insignia. The U.S. Navy's chief of naval operations has approved officers and enlisted to wear the Information Dominance Corps Warfare insignia after they have completed a qualification program.
The U.S. Navy established the Navy Cyber Forces (CYBERFOR) today at the Joint Expeditionary Base, Little Creek-Fort Story in Norfolk, Virginia. Vice Adm. H. Denby Starling II, USN, assumed command of CYBERFOR.
The U.S. Marine Corps is ramping up to conduct operations in cyberspace as part of its everyday capabilities. Marine Air Ground Task Forces (MAGTFs) will operate in cyberspace as they do on land, sea and air.
The U.S. military by and large is taking the wrong approach to cyberwarfare by treating it as a separate entity without the innovation that should bring. The country needs to incorporate it with other military activities and turn loose creative leadership for U.S. cyberwar activities to prevail.
"There is no warfare area more important than cyber."