Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo

Information security

The Exception Becomes the Rule

August 2010
By Chris Sanders

Researchers at the U.S. Army Research Laboratory and Electronic Warfare Associates Incorporated have partnered to implement a new intrusion detection architecture designed to defend against advanced persistent threat. The architecture, a component of the Network Attack Characterization, Modeling and Simulation Testbed, is an Army Research Laboratory computer network defense enclave that secures against cyber adversaries by providing rapid flexible responses to new threats. The program was launched in 2008 to combat the growing threat of cyberwar by improving intelligence sharing and computer network defense tactics among the U.S. Defense Department, cleared defense contractors, universities and private companies.

Approval Granted for Private Software to Run in Secure Cloud

August 2010
By Rita Boland, SIGNAL Magazine

The federal government has approved commercial products to operate on a defense cloud, marking the first time industry online offerings with this level of security are accessible to the military via such an environment. The accreditation, which took approximately two years, means that military organizations can route sensitive data through online software products. As more clients migrate to the cloud and employ the technology, the cost of use will drop. This creates a benefit for anyone wishing to take advantage of the offerings, which include a suite of products designed to enhance communications across Web, social and contact center touch points.

Government Prepares For Work Force Changes

August 2010
By Rita Boland, SIGNAL Magazine

The U.S. federal information technology work force is sandwiched between two major trends it must address to continue successful operations—the retirement eligibility of the Baby Boomer generation and the emergence of Web 2.0. The former threatens to empty hundreds of thousands of positions across the government, while the latter is shifting how the work force thinks about and uses technology. Solutions for both these issues converge in the Net Generation (sometimes referred to as Generation Y or the Millennial Generation), the demographic of youth currently preparing to enter institutions of higher learning and the job market. However, this population group is not a panacea for the government’s problems, because the ideas held by these young adults will challenge the status quo.

Guest Blog: Cases in How to Practice Safe Social Computing

May 25, 2010
By Paul Strassmann

Paul Strassmann continues from last week's "Gentlemen Do Not Open Attachments" with illustrations of how to implement safe social computing using virtual computers.

Guest Blog: Gentlemen Do Not Open Attachments

May 21, 2010
By Paul Strassmann

DoD policy recently opened access to Internet web pages from NIPRNET computers. This policy is unenforceable and is insecure. It allows the inadvertent inclusion of attachments for downloading of malware from where it can further propagate across DoD networks to subvert security.

Guest Blog: Computers for Shooters

April 27, 2010
By Paul Strassmann

Two weeks ago, I listened to a U.S. Marine Corps brigadier general plead for a lightweight personal computer that shooters could use at the squad level. All of the talk he heard about net-centric networks was meaningless because network centricity did not reach where it was needed. If the civilians could walk around with BlackBerrys, why couldn't the U.S. Defense Department provide comparable services?

DHS Leader Describes Partnership With Michigan

January 11, 2010
By Henry Kenyon

During an interview with Rear Adm. Michael A Brown, USN, last week, the admiral clarified the first-of-its-kind cybersecurity partnership with the state of Michigan.


Subscribe to RSS - Information security