cyber

June 29, 2015
By Terry Roberts

The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.

July 1, 2015
By Robert K. Ackerman
Part of the power grid is supported by electrical lines that carry power to customers through rugged terrain. Cybersecurity experts believe supervisory control and data acquisition (SCADA) systems may be the Achilles’ heels that allow malefactors to bring down such critical infrastructure via cyberspace.

A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.

June 24, 2015
By George I. Seffers
NSA officials intend to increase open source software releases through GitHub.

The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.

June 18, 2015
By George I. Seffers

On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.

June 18, 2015

AFCEA presents awards to three individuals for innovative cyber technology solutions during a ceremony at the Defensive Cyber Operations Symposium. The winners were selected from 50 entries in AFCEA's Cyber Solutions Showcase.

June 17, 2015
By George I. Seffers
Lt. Gen. James McLaughlin, USAF, deputy commander, U.S. Cyber Command, kicked off the second day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, during which military officials highlighted the importance of command and control in defending cyberspace.

Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.

June 16, 2015
By George I. Seffers
Lt. Gen. Ronnie Hawkins Jr., USAF, director, Defense Information Systems Agency (DISA), releases an updated strategic plan for the agency.

Speakers and panelists at day one of the AFCEA International Defensive Cyber Operations Symposium outline goals and offer predictions, and the director of DISA releases an updated strategic plan for the agency.

June 4, 2015

Raytheon BBN Technologies Corp., Cambridge, Massachusetts, has been awarded a $12,211,473 cost-plus-fixed-fee contract (HR0011-15-C-0097), for a research project under the Edge-Directed Cyber Technologies for Reliable Mission program. Fiscal 2015 research, development, test and evaluation funds in the amount of $2,331,395 are being obligated at time of award.

June 4, 2015

TASC Inc., Andover, Massachusetts, has been awarded a cost-plus-fixed-fee $6,966,555 modification (P00015) to previously awarded contract FA7037-11-D-0003. Contractor will provide management, engineering and technical support services required to support the establishment, maintenance and evolution of the 92nd Information Operations Squadron cyber assessment program. Work will be performed at San Antonio, Texas, and is expected to be complete by May 31, 2015. No funds are being obligated at the time of award.

May 12, 2015
By George I. Seffers

A new study from Juniper Research, Hampshire, United Kingdom, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.

May 7, 2015
By George I. Seffers

Arduous technology transition processes tempt some companies to walk away from negotiations.

March 9, 2015

Isis Defense, Alexandria, Virginia, has been awarded a $7,034,317 firm-fixed-price, other transaction for prototypes agreement, for a research project entitled "Threat Intelligence Platform." This agreement provides for the development of a threat intelligence and cyber analytics platform that will merge existing Defense Advanced Research Projects Agency big data research with novel approaches to high-performance computing and data storage hardware. Fiscal 2014 research, development, test and evaluation funds in the amount of $750,000 are being obligated at time of award.

February 26, 2015
By Maryann Lawlor

The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.

March 1, 2015
By Robert K. Ackerman

Challenges ranging from teaching people new ways of learning languages to providing security for homemade computer chips head the priority list for researchers at the National Security Agency. The exponential expansion of technology capabilities is perhaps matched by the growth of potential conflict areas, and both are increasing the issues faced by the agency’s research community.

January 12, 2015

In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.

January 9, 2015
By George I. Seffers

Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.

December 23, 2014
By George I. Seffers

The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.

December 19, 2014
By Sandra Jontz

Cyber attackers might have compromised computer files of more than 40,000 employees following an attack on federal contractor KeyPoint Government Solutions, according to the Office of Personnel Management.

November 19, 2014
By George I. Seffers

Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.

December 1, 2014
By Sandra Jontz

The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.

Pages