August 27, 2015
By Sandra Jontz
Gary Wang, deputy chief information officer/G-6 in the U.S. Army, says the U.S. government needs to identify the next generation of cyberwarriors when you are children. Photo by Mike Carpenter

Some of today’s 9-year-olds code in Java during their summer vacations, making them the optimal candidates the U.S. government and military should school to be the next generation of cyberwarriors.

August 26, 2015
By Sandra Jontz
Attendees listen to keynote addresses during the third annual AFCEA International TechNet Augusta conference, which wraps up Thursday. Photo by Mike Carptenter

Uncle Sam wants you—especially unicorns, leprechauns or something in between. As the U.S. Defense Department revamps the way it protects its critical infrastructures and networks from emerging cyberthreats, military leaders want to reshape their work force and attract to their ranks highly specialized experts, including coveted data scientists.

August 25, 2015
By Sandra Jontz
Gary Martin (c), program executive officer for command, control and communications-tactical (PEO C3T), discusses convergence at AFCEA's TechNet Augusta 2015 conference.

The U.S. Army must move quicker toward a massive cultural change to streamline cybersecurity processes—from training to all-out operations—if leaders hope to maintain the momentum toward innovation. 

August 25, 2015
By Sandra Jontz
Maj. Gen. Stephen Fogarty, USA, commanding general of U.S. Army Cyber Center of Excellence at Fort Gordon, Georgia, takes to the white board to illustrate dysfunctional stovepipes that keep military disciplines from sharing information and missions. Photo by Mike Carpenter

Convergence was the buzzword du jour as leaders outlined major changes to sweep the U.S. Army in efforts to shore up cyber weaknesses following a year of high-profile breaches and hacks that stunned the Defense Department. It is part of a cultural change that will have several military disciplines working together and removing the divides that have kept the intelligence community from working closely with signal commands, electronic warfare, cyber and information operations.

August 19, 2015

Northrop Grumman Systems Corp., McLean, Virginia, was awarded a $13,586,965 modification (0002) to contract W91RUS-14-D-0002 for non-personal information technology for the Army Regional Cyber Center-Europe, 5th Signal Command (Theater), with an estimated completion date of July 18, 2016.  Fiscal 2015 operations and maintenance (Army) funds in the amount of $6,508,863 were obligated at the time of the award. Army Contracting Command, Ft. Huachuca, Arizona, is the contracting activity.


August 6, 2015
By Bryan Ware

The cyber breach at OPM pilfered the personal information of millions of U.S. federal workers, putting them at risk and highlighting a number of security shortcomings within the federal government. But the true magnitude of the attack has yet to be realized, much less revealed.

July 24, 2015

The Department of Homeland Security Science and Technology Directorate (S&T) today announced a $2.9 million cybersecurity mobile app security research and development award that will help identify mobile app vulnerabilities. The Northern Virginia-based small business, Kryptowire, was awarded a 30-month contract through the S&T’s Long Range Broad Agency Announcement.

July 15, 2015
By Sandra Jontz

Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad. The state of cybersecurity isn't as good as experts hoped, given years of initiatives and billions of dollars invested in shoring up vulnerabilities.

July 10, 2015
By Sandra Jontz
Defense Department CIO Terry Halvorsen addresses mobility concerns at the enterprise level. Photo by Michael Carpenter

As the Defense Department dives into the mobility ecosystem and embraces the use of mobile devices by the warfighter in the battlefield up to the highest echelons of leadership, it seeks solutions too for full-on mobility at the enterprise level. Devices are secure enough, leaders say. Now, they want solutions from industry on how to protect the data. 

July 9, 2015
By Sandra Jontz

Hackers behind cybersecurity attacks on the U.S. federal government through the Office of Personnel Management pilfered personal information from a much more significant number of current and former employees than previously reported.

June 29, 2015
By Terry Roberts

The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.

July 1, 2015
By Robert K. Ackerman
Part of the power grid is supported by electrical lines that carry power to customers through rugged terrain. Cybersecurity experts believe supervisory control and data acquisition (SCADA) systems may be the Achilles’ heels that allow malefactors to bring down such critical infrastructure via cyberspace.

A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.

June 24, 2015
By George I. Seffers
NSA officials intend to increase open source software releases through GitHub.

The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.

June 18, 2015
By George I. Seffers

On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.

June 18, 2015

AFCEA presents awards to three individuals for innovative cyber technology solutions during a ceremony at the Defensive Cyber Operations Symposium. The winners were selected from 50 entries in AFCEA's Cyber Solutions Showcase.

June 17, 2015
By George I. Seffers
Lt. Gen. James McLaughlin, USAF, deputy commander, U.S. Cyber Command, kicked off the second day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, during which military officials highlighted the importance of command and control in defending cyberspace.

Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.

June 16, 2015
By George I. Seffers
Lt. Gen. Ronnie Hawkins Jr., USAF, director, Defense Information Systems Agency (DISA), releases an updated strategic plan for the agency.

Speakers and panelists at day one of the AFCEA International Defensive Cyber Operations Symposium outline goals and offer predictions, and the director of DISA releases an updated strategic plan for the agency.

June 4, 2015

Raytheon BBN Technologies Corp., Cambridge, Massachusetts, has been awarded a $12,211,473 cost-plus-fixed-fee contract (HR0011-15-C-0097), for a research project under the Edge-Directed Cyber Technologies for Reliable Mission program. Fiscal 2015 research, development, test and evaluation funds in the amount of $2,331,395 are being obligated at time of award.

June 4, 2015

TASC Inc., Andover, Massachusetts, has been awarded a cost-plus-fixed-fee $6,966,555 modification (P00015) to previously awarded contract FA7037-11-D-0003. Contractor will provide management, engineering and technical support services required to support the establishment, maintenance and evolution of the 92nd Information Operations Squadron cyber assessment program. Work will be performed at San Antonio, Texas, and is expected to be complete by May 31, 2015. No funds are being obligated at the time of award.

May 12, 2015
By George I. Seffers

A new study from Juniper Research, Hampshire, United Kingdom, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.