Some of today’s 9-year-olds code in Java during their summer vacations, making them the optimal candidates the U.S. government and military should school to be the next generation of cyberwarriors.
Uncle Sam wants you—especially unicorns, leprechauns or something in between. As the U.S. Defense Department revamps the way it protects its critical infrastructures and networks from emerging cyberthreats, military leaders want to reshape their work force and attract to their ranks highly specialized experts, including coveted data scientists.
The U.S. Army must move quicker toward a massive cultural change to streamline cybersecurity processes—from training to all-out operations—if leaders hope to maintain the momentum toward innovation.
Convergence was the buzzword du jour as leaders outlined major changes to sweep the U.S. Army in efforts to shore up cyber weaknesses following a year of high-profile breaches and hacks that stunned the Defense Department. It is part of a cultural change that will have several military disciplines working together and removing the divides that have kept the intelligence community from working closely with signal commands, electronic warfare, cyber and information operations.
Northrop Grumman Systems Corp., McLean, Virginia, was awarded a $13,586,965 modification (0002) to contract W91RUS-14-D-0002 for non-personal information technology for the Army Regional Cyber Center-Europe, 5th Signal Command (Theater), with an estimated completion date of July 18, 2016. Fiscal 2015 operations and maintenance (Army) funds in the amount of $6,508,863 were obligated at the time of the award. Army Contracting Command, Ft. Huachuca, Arizona, is the contracting activity.
The cyber breach at OPM pilfered the personal information of millions of U.S. federal workers, putting them at risk and highlighting a number of security shortcomings within the federal government. But the true magnitude of the attack has yet to be realized, much less revealed.
The Department of Homeland Security Science and Technology Directorate (S&T) today announced a $2.9 million cybersecurity mobile app security research and development award that will help identify mobile app vulnerabilities. The Northern Virginia-based small business, Kryptowire, was awarded a 30-month contract through the S&T’s Long Range Broad Agency Announcement.
Cyber intelligence is the emerging buzz term as the United States works to fend off not just attacks by criminals and nation-state hackers, but terrorists calling for an electronic jihad. The state of cybersecurity isn't as good as experts hoped, given years of initiatives and billions of dollars invested in shoring up vulnerabilities.
As the Defense Department dives into the mobility ecosystem and embraces the use of mobile devices by the warfighter in the battlefield up to the highest echelons of leadership, it seeks solutions too for full-on mobility at the enterprise level. Devices are secure enough, leaders say. Now, they want solutions from industry on how to protect the data.
Hackers behind cybersecurity attacks on the U.S. federal government through the Office of Personnel Management pilfered personal information from a much more significant number of current and former employees than previously reported.
The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.
A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.
The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.
On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.
AFCEA presents awards to three individuals for innovative cyber technology solutions during a ceremony at the Defensive Cyber Operations Symposium. The winners were selected from 50 entries in AFCEA's Cyber Solutions Showcase.
Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.
Speakers and panelists at day one of the AFCEA International Defensive Cyber Operations Symposium outline goals and offer predictions, and the director of DISA releases an updated strategic plan for the agency.
Raytheon BBN Technologies Corp., Cambridge, Massachusetts, has been awarded a $12,211,473 cost-plus-fixed-fee contract (HR0011-15-C-0097), for a research project under the Edge-Directed Cyber Technologies for Reliable Mission program. Fiscal 2015 research, development, test and evaluation funds in the amount of $2,331,395 are being obligated at time of award.
TASC Inc., Andover, Massachusetts, has been awarded a cost-plus-fixed-fee $6,966,555 modification (P00015) to previously awarded contract FA7037-11-D-0003. Contractor will provide management, engineering and technical support services required to support the establishment, maintenance and evolution of the 92nd Information Operations Squadron cyber assessment program. Work will be performed at San Antonio, Texas, and is expected to be complete by May 31, 2015. No funds are being obligated at the time of award.
A new study from Juniper Research, Hampshire, United Kingdom, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.