Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Networks

PEO Spotlight: Improving the Navy's Information Kill Chain

November 1, 2014
By Rita Boland

The U.S. Navy’s technology plans are moving away from systems to focus on capabilities. Changes aim to ensure that the fleet has the functionality to be operationally ready at all times.

Rear Adm. Christian “Boris” Becker, USN, program executive officer (PEO) Command, Control, Communications, Computers and Intelligence (C4I) and PEO Space Systems, explains that the mission of his organizations is to develop, acquire, deploy and sustain in the most effective manner possible the naval information dominance capabilities warfighters need to accomplish their missions, including coordinating all Department of the Navy space research, development and acquisition activities. The current fiscal environment demands that work be carried out with affordability as a key consideration along with providing required support. “It’s about warfighting capability for the fleet,” Adm. Becker states. “That’s where our priorities begin and that’s where our priorities end: getting capabilities to the fleet.”

Looking out long term, the Navy needs to understand how to improve the warfighting readiness of deployed systems. The admiral explains that capabilities must be provided in a way that allows for modernization; part of that effort involves commonality and interoperability in products. “Capabilities evolve for their own purposes and their own mission,” he says. “It’s time for us to take a more holistic view.”

Performing Open-Heart Surgery on Pacific Fleet Systems

November 1, 2014
By George I. Seffers

As the U.S. Navy modernizes information systems across the fleet, one organization is responsible for researching, developing and fielding the full range of technologies in the Asia-Pacific region, providing complete life cycle development and support for systems, from concept to fielded capability.

Ramping Up the
 Federal Cloud Against the Insider Threat

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

Awaited Technologies About to Become Reality for Warfighters

October 1, 2014
By Rita Boland

The U.S. Army is extending advanced communications to disadvantaged users, fielding a series of capabilities to various groups in an effort to give soldiers at the pointy end of the spear the connectivity they need. With the rollout, forward-deployed troops should be able to access classified networks via wireless 4G long-term evolution connections. National Guard units also are acquiring the tools to aid their troops in disaster response scenarios.

Combating Terrorism with Next-Generation Mesh Networking

October 1, 2014
By George I. Seffers

U.S. Defense Department and interagency special operators are scheduled to begin receiving new tactical mesh networking equipment this month. The kit provides a mobile, ad hoc, self-healing network that offers a full range of situational awareness data, including intelligence, surveillance and reconnaissance feeds, blue force tracking and a voice over Internet protocol capability.

Some Cyber Attackers Lie Low

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

United States to Combine Multiple Intelligence Missions Into Single U.K. Complex

September 1, 2014
By Rita Boland

The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations.

Policy Problems Vex Corporate
 Bring Your
 Own Device

September 1, 2014
By Sandra Jontz

The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.

Government Adopting Software-Defined Networking

July 31, 2014
By George I. Seffers

Government information technology experts see benefits and challenges to software-defined networking.

National Labs and Industry Partner to Train Critical Infrastructure Cybersecurity Specialists

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory and Los Alamos National Laboratory join Bechtel BNI to train a new class of cyberdefense professionals. The program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry.

Pages

Subscribe to RSS - Networks