The OPM breach should serve as a wake-up call for the government to take specific measures to protect its most valuable assets—its people and their information.
A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.
The National Security Agency’s recently established GitHub presence could become a focal point for releasing new technologies into the open source community.
On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.
AFCEA presents awards to three individuals for innovative cyber technology solutions during a ceremony at the Defensive Cyber Operations Symposium. The winners were selected from 50 entries in AFCEA's Cyber Solutions Showcase.
Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.
Speakers and panelists at day one of the AFCEA International Defensive Cyber Operations Symposium outline goals and offer predictions, and the director of DISA releases an updated strategic plan for the agency.
Raytheon BBN Technologies Corp., Cambridge, Massachusetts, has been awarded a $12,211,473 cost-plus-fixed-fee contract (HR0011-15-C-0097), for a research project under the Edge-Directed Cyber Technologies for Reliable Mission program. Fiscal 2015 research, development, test and evaluation funds in the amount of $2,331,395 are being obligated at time of award.
TASC Inc., Andover, Massachusetts, has been awarded a cost-plus-fixed-fee $6,966,555 modification (P00015) to previously awarded contract FA7037-11-D-0003. Contractor will provide management, engineering and technical support services required to support the establishment, maintenance and evolution of the 92nd Information Operations Squadron cyber assessment program. Work will be performed at San Antonio, Texas, and is expected to be complete by May 31, 2015. No funds are being obligated at the time of award.
A new study from Juniper Research, Hampshire, United Kingdom, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.
Arduous technology transition processes tempt some companies to walk away from negotiations.
Isis Defense, Alexandria, Virginia, has been awarded a $7,034,317 firm-fixed-price, other transaction for prototypes agreement, for a research project entitled "Threat Intelligence Platform." This agreement provides for the development of a threat intelligence and cyber analytics platform that will merge existing Defense Advanced Research Projects Agency big data research with novel approaches to high-performance computing and data storage hardware. Fiscal 2014 research, development, test and evaluation funds in the amount of $750,000 are being obligated at time of award.
The Intelligence Advanced Research Projects Activity (IARPA) Office for Anticipating Surprise has initiated a competition for its Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program, which aims at discovering ways to anticipate cyber attacks before they occur.
Challenges ranging from teaching people new ways of learning languages to providing security for homemade computer chips head the priority list for researchers at the National Security Agency. The exponential expansion of technology capabilities is perhaps matched by the growth of potential conflict areas, and both are increasing the issues faced by the agency’s research community.
In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.
Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.
The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.
Cyber attackers might have compromised computer files of more than 40,000 employees following an attack on federal contractor KeyPoint Government Solutions, according to the Office of Personnel Management.
Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.
The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.