cyber

September 10, 2014
George I. Seffers

Mission success in the cyber arena, especially in a constrained budget environment, requires both cooperation and innovation, but military and industry officials speaking at AFCEA TechNet Augusta 2014 say they are not yet seeing enough of either.

September 10, 2014
By George I. Seffers

The U.S. Army is building a Cyber Center of Excellence at Fort Gordon, Georgia, and it will not come cheap, warned Maj. Gen. Stephen Fogarty, USA, the center’s new commanding general.

September 10, 2014
By George I. Seffers

Former National Security Agency contractor Edward Snowden single-handedly shocked the U.S. intelligence community by leaking reams of information to the news media, but the insider threat is much more widespread, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia.

September 10, 2014
By George I. Seffers

The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.

September 9, 2014
By George I. Seffers

U.S. Army officials struggled during the AFCEA TechNet Augusta 2014 to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the effects or challenges of emerging technologies.

September 9, 2014
By George I. Seffers

The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers.

September 9, 2014
George I. Seffers

U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, according to Lt. Gen. Edward Cardon, USA, commanding general, Army Cyber Command.

September 9, 2014
George I. Seffers

Sometimes, cyber warriors will have to pick and choose what to protect, because, “It’s increasingly clear we can’t protect everything,” said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, while addressing the AFCEA TechNet Augusta audience.

September 9, 2014
George I. Seffers

All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, speaking as a keynote at AFCEA TechNet Augusta.

August 15, 2014

Ace Technology Partners LLC, Elk Grove Village, Illinois, has been awarded a $7,047,715 firm-fixed-price contract for Fidelis eXtrusion Prevention System (XPS) standard maintenance and software. The Air Force Life Cycle Management Center, Cryptologic and Cyber Systems Division, Lackland Air Force Base, Texas, is the contracting activity (FA8732-13-D-0014 RV01).

May 27, 2014

Lockheed Martin Corp., Orlando, Florida, was awarded a $14,220,326 cost-plus-fixed-fee contract to operate and sustain the National Cyber Range capability which is designed to allow potentially virulent code to be introduced and studied on the range without compromising the range itself. U.S. Army Program Executive Office Simulation, Training and Instrumentation, Orlando, Florida, is the contracting activity (W900KK-14-C-0020).

May 16, 2014

ICF International, Fairfax, Virginia $49,983,761 was awarded a cost-plus-fixed-fee contract for support to the Army Research Laboratory Cyber Network Defense Research and Services. Work will be performed in Adelphi, Maryland with an estimated completion date of May 15, 2017. Army Contracting Command, Adelphi, Maryland, is the contracting activity (W911QX-14-F-0020).

March 3, 2014

Truestone, Herndon, Va., was awarded a $6,685,148 cost-plus-fixed-fee contract for reverse engineering, limited prototyping for exploitation, test and evaluation, and target validation. The contractor shall provide program management, engineering, and technical support related to a wide range of technologies managed in the Intelligence and Information Warfare Directorate, Technical Characterization and Exploitation Branch, Cyber Offensive Operations Division. Army Contracting Command, Aberdeen, Md., is the contracting activity (W15P7T-14-C-A159).

December 19, 2013
By Henry S. Kenyon

The U.S. Air Force is moving aggressively to modernize its information technology capabilities to ease its move to the Defense Department’s Joint Information Environment (JIE). The JIE will enable a shared information technology architecture, services and infrastructure across the entire military. But to reach its goals, the service will need to close excess data centers and improve its security policies.

November 5, 2013
By Henry S. Kenyon

A new government-run competition seeks to advance the boundaries of computer network analysis and defense by developing autonomous cyberdefense capabilities, which combine the speed and scale of automation with reasoning abilities that exceed what human experts can do.

When it comes to cybersecurity, companies are only as strong as their weakest link. In most cases, the weakest link can be organizations’ own employees. Social engineering, rogue email attachments and access through telecommuting are just a few of the ways cybercriminals can creep into otherwise secure networks.

May 30, 2013
By Henry S. Kenyon

The U.S. Navy is establishing new teams to run cyber operations and help defend Defense Department networks as a service extension of U.S. Cyber Command. These teams are part of a centralized defensive and offensive cyber capability that is beginning to take shape within the Defense Department, said Kevin Cooley, command information officer for the Navy’s Fleet Cyber Command/10th Fleet.

May 22, 2013
George I. Seffers

Honeywell Technology Solutions Inc., Columbia, Md., is being awarded a not to exceed $14,240,320 indefinite-delivery/indefinite-quantity contract with firm-fixed-price provisions for continuation of technical and analytical support services for the Office of Compliance and Assessment.

March 8, 2013
George I. Seffers

 

January 31, 2013
By Robert K. Ackerman

The task of protecting U.S. military cyber assets is increasing in complexity as new capabilities come to dominate communications and networking. Planners must implement security measures that do not hinder the new technologies introduced to the force.

That challenge was in a cyber fireside chat that opened the final day of AFCEA/USNI West 2013 in San Diego. Robert J. Carey, deputy chief information officer for the U.S. Defense Department, noted that one key tasking is to protect the mobile devices that now are proliferating in the force.

Pages