Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Guest Blogs

A Call for New Cybersecurity Collaboration Models

January 10, 2011
By Christine Robinson

Many recognize that our existing organizational and acquisition models can't respond quickly enough to meet the cyber challenge. Why not establish a neutral entity to act as an impartial system integrator that collaborates global efforts and resources to anticipate and defend against our cyber adversaries?

MARS' Mission: Find a New Home, Continue Long-Standing Tradition of Service

September 17, 2010
By David Trachtenberg

The Military Auxiliary Radio System-MARS-has been a mainstay in military and civilian support communications for decades. Its value as a voluntary civilian entity under the umbrella of the ASD(NII) cannot be understated. But now that the ASD(NII) faces disbanding at the behest of Defense Secretary Gates, what does the future hold? MARS has several potential destinations, but what's the best fit? Where will MARS receive the support it requires to continue flourishing? Share your opinions and ideas here.

An Online Marketplace Serving Those Who Serve

September 13, 2010
By planetrussell

Blake Hall is a man on a mission: to help U.S. military personnel use "Web 2.0" Internet technologies to help one another and themselves. Hall's no stranger to demanding missions. A decorated former U.S. Army Captain and Airborne Ranger who led a scout platoon in Iraq, he relates how the first time he ever led a combat mission, his battalion commander laid his hand on his shoulder and said ominously, "Hall, don't screw it up." And based on the overwhelmingly positive, initial response to his and his co-founders' new, veteran-owned web venture, TroopSwap.com, an online community and marketplace for active duty U.S. military, reservists, veterans and their families, that battalion commander would be more than proud.

How to Improve Cyberdefenses at the DoD

August 23, 2010
By Paul Strassmann

A different cybersecurity culture needs to be diffused throughout the Defense Department. It will have to view cyberdefenses not as a bandage to be selectively applied to a patchwork of applications. The new cybersecurity must become an inseparable feature of every computer technology that enables our operations.

Cyberdefense and DoD Culture

August 23, 2010
By Paul Strassmann

Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.

Guest Blog: Cybersecurity Is Asymmetric

July 14, 2010
By Paul Strassmann

Cybersecurity leaks originate from insiders. Unchecked social computing can be the attacker's favorite means for data mining. From the standpoint of our enemies, acquiring easily accessible intelligence from inside sources can be simpler than whatever can be obtained by means of hard work to crack Defense Department barriers.

Fourth of July Reflections

July 1, 2010

Guest blogger James Schenck, a U.S. Army veteran and president of the PenFed Foundation, reflects on the military community as we prepare to celebrate our nation's birthday. "This Fourth of July, I ask you to join me in saluting the sacrifices of all veterans who served to defend our nation and remembering their contributions. While the nation reflects on sacrifices of veterans this Independence Day who did not return back from war, I also would like to salute members of the military who sacrificed in other ways."

Virtualization of Servers: The First Step Into the Cloud

June 16, 2010
By Paul Strassmann

Migration into a cloud environment by means of virtualization of servers is extremely attractive and has instant paybacks. Compared with other software-intensive improvements, the ability to combine servers in order to increase computer utilization from less than 20 percent to over 70 percent is the most attractive choice in the current environment, when cuts in IT budgets for FY12 and beyond are required by end of this July.

Guest Post: Network Virtualization

June 9, 2010
By Paul Strassmann

Paul Strassmann offers his insights on network virtualization as an answer to cyber security concerns about the proliferation of things contributing to the "attack surface," such as networks, circuits and computers.

Guest Blog: Cases in How to Practice Safe Social Computing

May 25, 2010
By Paul Strassmann

Paul Strassmann continues from last week's "Gentlemen Do Not Open Attachments" with illustrations of how to implement safe social computing using virtual computers.

Pages

Subscribe to RSS - Guest Blogs