Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Guest Blogs

The Real Agents of Change

July 25, 2011
By Christine Robinson

We presently are experiencing intense pressure not to raise the debt ceiling, prophecies about the downfall of government IT, more legislators considering reducing the once-sacred defense budget, and prophecies of gloom and doom relating to government programs in general. Despite this, a number of leaders and real change agents both in government and outside government offer us some real hope and shining examples.

This 4th of July, Celebrate Our Nation's Heroes

July 1, 2011
By Rita Boland

The president and CEO of the USO of Metropolitan Washington encourages everyone to remember our troops and their families as we celebrate our nation's independence.

Cybersecurity Isn't Only About the Network

June 1, 2011
By Christine Robinson

The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.

Protecting Our Infrastructure With Unified Disaster Planning

February 16, 2011
By Christine Robinson

Individuals, communities, industry, and governments often neglect to plan for secure normal and contingency operations until a disaster strikes. Rather than planning them separately, why not plan normal operations, physical and cyber security, emergency preparedness and disaster recovery, and integrating renewable energy resources? Military and civilian operations on every level and every nation can benefit both before and after an emergency strikes from adopting industry and government best practices and available technologies available around the world today.

A Call for New Cybersecurity Collaboration Models

January 10, 2011
By Christine Robinson

Many recognize that our existing organizational and acquisition models can't respond quickly enough to meet the cyber challenge. Why not establish a neutral entity to act as an impartial system integrator that collaborates global efforts and resources to anticipate and defend against our cyber adversaries?

MARS' Mission: Find a New Home, Continue Long-Standing Tradition of Service

September 17, 2010
By David Trachtenberg

The Military Auxiliary Radio System-MARS-has been a mainstay in military and civilian support communications for decades. Its value as a voluntary civilian entity under the umbrella of the ASD(NII) cannot be understated. But now that the ASD(NII) faces disbanding at the behest of Defense Secretary Gates, what does the future hold? MARS has several potential destinations, but what's the best fit? Where will MARS receive the support it requires to continue flourishing? Share your opinions and ideas here.

An Online Marketplace Serving Those Who Serve

September 13, 2010
By planetrussell

Blake Hall is a man on a mission: to help U.S. military personnel use "Web 2.0" Internet technologies to help one another and themselves. Hall's no stranger to demanding missions. A decorated former U.S. Army Captain and Airborne Ranger who led a scout platoon in Iraq, he relates how the first time he ever led a combat mission, his battalion commander laid his hand on his shoulder and said ominously, "Hall, don't screw it up." And based on the overwhelmingly positive, initial response to his and his co-founders' new, veteran-owned web venture, TroopSwap.com, an online community and marketplace for active duty U.S. military, reservists, veterans and their families, that battalion commander would be more than proud.

How to Improve Cyberdefenses at the DoD

August 23, 2010
By Paul Strassmann

A different cybersecurity culture needs to be diffused throughout the Defense Department. It will have to view cyberdefenses not as a bandage to be selectively applied to a patchwork of applications. The new cybersecurity must become an inseparable feature of every computer technology that enables our operations.

Cyberdefense and DoD Culture

August 23, 2010
By Paul Strassmann

Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.

Guest Blog: Cybersecurity Is Asymmetric

July 14, 2010
By Paul Strassmann

Cybersecurity leaks originate from insiders. Unchecked social computing can be the attacker's favorite means for data mining. From the standpoint of our enemies, acquiring easily accessible intelligence from inside sources can be simpler than whatever can be obtained by means of hard work to crack Defense Department barriers.

Pages

Subscribe to RSS - Guest Blogs