cyber

September 18, 2014
By Robert K. Ackerman

The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.

September 17, 2014
By Rita Boland

The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.

September 12, 2014
By Rita Boland

The Department of Homeland Security Science and Technology Directorate has transitioned the first technology in its Transition to Practice program to commercial market two years ahead of schedule.

September 11, 2014
By George I. Seffers

The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.

September 11, 2014
By George I. Seffers

Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.

September 10, 2014
George I. Seffers

Mission success in the cyber arena, especially in a constrained budget environment, requires both cooperation and innovation, but military and industry officials speaking at AFCEA TechNet Augusta 2014 say they are not yet seeing enough of either.

September 10, 2014
By George I. Seffers

The U.S. Army is building a Cyber Center of Excellence at Fort Gordon, Georgia, and it will not come cheap, warned Maj. Gen. Stephen Fogarty, USA, the center’s new commanding general.

September 10, 2014
By George I. Seffers

Former National Security Agency contractor Edward Snowden single-handedly shocked the U.S. intelligence community by leaking reams of information to the news media, but the insider threat is much more widespread, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia.

September 10, 2014
By George I. Seffers

The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.

September 9, 2014
By George I. Seffers

U.S. Army officials struggled during the AFCEA TechNet Augusta 2014 to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the effects or challenges of emerging technologies.

September 9, 2014
By George I. Seffers

The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers.

September 9, 2014
George I. Seffers

U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, according to Lt. Gen. Edward Cardon, USA, commanding general, Army Cyber Command.

September 9, 2014
George I. Seffers

Sometimes, cyber warriors will have to pick and choose what to protect, because, “It’s increasingly clear we can’t protect everything,” said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, while addressing the AFCEA TechNet Augusta audience.

September 9, 2014
George I. Seffers

All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, speaking as a keynote at AFCEA TechNet Augusta.

August 15, 2014

Ace Technology Partners LLC, Elk Grove Village, Illinois, has been awarded a $7,047,715 firm-fixed-price contract for Fidelis eXtrusion Prevention System (XPS) standard maintenance and software. The Air Force Life Cycle Management Center, Cryptologic and Cyber Systems Division, Lackland Air Force Base, Texas, is the contracting activity (FA8732-13-D-0014 RV01).

May 27, 2014

Lockheed Martin Corp., Orlando, Florida, was awarded a $14,220,326 cost-plus-fixed-fee contract to operate and sustain the National Cyber Range capability which is designed to allow potentially virulent code to be introduced and studied on the range without compromising the range itself. U.S. Army Program Executive Office Simulation, Training and Instrumentation, Orlando, Florida, is the contracting activity (W900KK-14-C-0020).

May 16, 2014

ICF International, Fairfax, Virginia $49,983,761 was awarded a cost-plus-fixed-fee contract for support to the Army Research Laboratory Cyber Network Defense Research and Services. Work will be performed in Adelphi, Maryland with an estimated completion date of May 15, 2017. Army Contracting Command, Adelphi, Maryland, is the contracting activity (W911QX-14-F-0020).

March 3, 2014

Truestone, Herndon, Va., was awarded a $6,685,148 cost-plus-fixed-fee contract for reverse engineering, limited prototyping for exploitation, test and evaluation, and target validation. The contractor shall provide program management, engineering, and technical support related to a wide range of technologies managed in the Intelligence and Information Warfare Directorate, Technical Characterization and Exploitation Branch, Cyber Offensive Operations Division. Army Contracting Command, Aberdeen, Md., is the contracting activity (W15P7T-14-C-A159).

December 19, 2013
By Henry S. Kenyon

The U.S. Air Force is moving aggressively to modernize its information technology capabilities to ease its move to the Defense Department’s Joint Information Environment (JIE). The JIE will enable a shared information technology architecture, services and infrastructure across the entire military. But to reach its goals, the service will need to close excess data centers and improve its security policies.

November 5, 2013
By Henry S. Kenyon

A new government-run competition seeks to advance the boundaries of computer network analysis and defense by developing autonomous cyberdefense capabilities, which combine the speed and scale of automation with reasoning abilities that exceed what human experts can do.

Pages