Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Networks

Some Cyber Attackers Lie Low

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

United States to 
Combine Multiple Intelligence Missions 
Into Single U.K. Complex

September 1, 2014
By Rita Boland

The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations.

Policy Problems Vex Corporate
 Bring Your
 Own Device

September 1, 2014
By Sandra Jontz

The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.

Government Adopting Software-Defined Networking

July 31, 2014
By George I. Seffers

Government information technology experts see benefits and challenges to software-defined networking.

National Labs and Industry Partner to Train Critical Infrastructure Cybersecurity Specialists

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory and Los Alamos National Laboratory join Bechtel BNI to train a new class of cyberdefense professionals. The program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry.

Cryptography Advisory Group Addresses NIST Ties to NSA

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

Nearly 70 Percent of Critical Infrastructure Providers' Information Systems Have Been Breached in Past Year

July 10, 2014
By Maryann Lawlor

Only 6 percent of power and water companies say they provide cybersecurity training to all employees.

U.S. Army Explores Push-Button Networking

August 1, 2014
By George I. Seffers

The U.S. Army’s current tactical network delivers a wide range of capabilities for warfighters, including unprecedented communications on the move. But the complexity can overwhelm commanders who have countless critical tasks to complete and soldiers’ lives in their hands. Future tactical networks will automate many processes and may be smart enough to advise commanders, similar to JARVIS, Iron Man’s computerized assistant.

The Army’s current networking technology includes Capability Set 13, a package of network components, associated equipment and software that provides an integrated capability from the tactical operations center to the dismounted soldier. It supports Army warfighters in Afghanistan and provides a host of capabilities not offered by the wide area network in use as recently as 2012. The Army has fielded the capability set down to the company commander level with a package known as the Soldier Network Extension, which delivers some challenges along with the added capabilities. “The company commander is trying to maneuver around the battlefield, and he’s trying to command a company, and he has these new pieces of kit that he has to learn how to use, and it’s complicated. That’s part of the problem,” says Jennifer Zbozny, chief engineer for the Army Program Executive Office for Command, Control and Communications-Tactical. “If you had an iPhone with an interface you didn’t understand, and you had to do a million things and log on a million different ways, you’d probably get tired of it and decide it’s not worth the effort.”

Necessity Drives Joint Information Environment

July 1, 2014
By Robert K. Ackerman

The shrinking military cannot achieve mission success without the advances promised by the Joint Information Environment, U.S. Defense Department leaders say. Yet the effort itself depends on innovative advances that may lead to changes in doctrine and operations if—and when—they are incorporated into the force.

No clear technology or architecture has emerged to define the JIE. While the military has a goal in mind, it also recognizes that information technologies and capabilities are evolving faster than planners can predict. The commercial sector, which could serve as a fount of ideas for defense networking, itself is structuring its strategies to accommodate unforeseen changes. Different parts of the defense and intelligence communities have their own nonnegotiable requirements for JIE participation.

Different organizations and disciplines strive to break down silos and give the Defense Department its JIE. Leading defense communicators agree that the force cannot prevail in future operations without a single information environment, but they must ensure that it does not ignore the specific needs of some individual elements within the defense community.

Many of these issues were discussed at AFCEA’s three-day JIE Mission Partner Symposium held May 12-14 in Baltimore. Overflow crowds heard speakers and panelists from government, the military and industry discuss the need for the JIE and the challenges that stand in the way of its implementation.

U.S. military forces will not be able to pursue operational goals successfully unless the JIE is implemented, according to a member of the Joint Staff. Lt. Gen. Mark S. Bowman, J-6, The Joint Staff, was unambiguous in his assessment of the JIE’s importance.

Defense Networking Goes Commercial

June 25, 2014
By Robert K. Ackerman

U.S. Defense Department data will be invading the commercial world as the department moves its unclassified information out of its own hands. Terry Halvorsen, acting Defense Department chief information officer, described the upcoming move at the AFCEA Cyber Symposium.

Pages

Subscribe to RSS - Networks