Isis Defense, Alexandria, Virginia, has been awarded a $7,034,317 firm-fixed-price, other transaction for prototypes agreement, for a research project entitled "Threat Intelligence Platform." This agreement provides for the development of a threat intelligence and cyber analytics platform that will merge existing Defense Advanced Research Projects Agency big data research with novel approaches to high-performance computing and data storage hardware. Fiscal 2014 research, development, test and evaluation funds in the amount of $750,000 are being obligated at time of award.
The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.
Challenges ranging from teaching people new ways of learning languages to providing security for homemade computer chips head the priority list for researchers at the National Security Agency. The exponential expansion of technology capabilities is perhaps matched by the growth of potential conflict areas, and both are increasing the issues faced by the agency’s research community.
In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.
Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.
The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.
Cyber attackers might have compromised computer files of more than 40,000 employees following an attack on federal contractor KeyPoint Government Solutions, according to the Office of Personnel Management.
Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.
The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.
Article updated December 3, 2014.
With a number of uncertainties coloring their activities, officials at the U.S. Army’s Communications-Electronics Research, Development and Engineering Center are preparing their program objective memorandum, laying out several key projects and goals for the coming years. The leaders are calibrating efforts to align with expected congressional funding as well as with the capabilities soldiers require for mission success.
Adm. Michael Rogers, USN, who leads both the National Security Agency and U.S. Cyber Command, predicts a damaging attack to critical infrastructure networks within the coming years. If an attack happens, the agency and Cyber Command will coordinate a response along with other government agencies and potentially the private sector organizations that own many of the networks.
The U.S. Defense Information Systems Agency is being tasked with an operational role in the cyber domain, namely network defense. The new role creates a formal relationship between the agency, U.S. Cyber Command and the military services; integrates network operations and defense; and should ultimately improve security.
The U.S. Navy’s Task Force Cyber Awakening, which was established in July, is expected to deliver its first report to the service’s leadership this month, task force officials say. The report will include recommendations for improving the service’s cyber posture, both ashore and afloat.
Booz Allen Hamilton, McLean, Virginia, is being awarded a $6,643,293 task order (P00003) to a previously awarded firm-fixed-price contract (HQ0034-14-A-0023) to provide technical support services for the Department of Defense's Chief Information Officer Cybersecurity and Information Assurance Support program. Work will be performed in Alexandria, Virginia, with an expected completion date of Oct. 16, 2015.
NCI Inc., Reston, Va., has announced that it was awarded a cost-plus-fixed-fee, single-award indefinite delivery, indefinite quantity contract valued at $125 million for cyber network operations and security support (CNOSS) services for the U.S. Army's Network Enterprise Technology Command (NETCOM) G3/5/7. NCI has served NETCOM since 2007, with two predecessor contracts to CNOSS. The new contract has a 12-month base period with two one-year option periods and one six-month option period.
LongView International, Reston, Virginia, has been awarded a maximum $8,291,746 modification (P0006) exercising the first option period on a one-year base contract (HT0011-13-F-0039) with three one-year options for software design, development and testing to support emerging requirements in the Defense Medical Logistics Standard Support (DMLSS), DMLSS Customer Assistance Module and Joint Medical Asset Repository applications to meet information assurance and the establishment of new data exchanges/services.
SeKON Enterprises Incorporated, Herndon, Virginia, was awarded an $12,433,560 cost-plus-fixed-fee contract, with options, to provide engineering, cybersecurity and configuration management support services to the program executive officer, Defense Healthcare Management Systems. The total potential contract value, including the one-year base period and four one-year option periods, is $75,603,463.
The U.S. Army officially activated its Cyber Protection Brigade earlier this month, marking the first time the service has had such a unit. As the defensive operations enabled by the brigade ramp up, the Army now also has a cyber branch operating provisionally, which will change the way soldiers are assigned to cyber career fields.
The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.
The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.