Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

homeland defense

Defense and Security In Europe Today

March 1, 2014
By Kent R. Schneider

Even though the Cold War has ended and the monolithic threat against the West has disappeared, the relationship between Europe and the United States remains vital. Europe includes some of the United States’ strongest coalition partners and alliances; the two economies are closely tied and interdependent; and defense and security in Europe are evolving rapidly, just as in the United States. AFCEA chapters and members outside the United States number the greatest in Europe.

Ramping Up the Cyber Criminal Hunt

March 1, 2014
By George I. Seffers

U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.

Automated Diagnostics and Mitigation Protects Civilian Government Computer Networks

March 1, 2014
By Henry S. Kenyon

A Department of Homeland Security program is automating the cyber attack detection process to manage the bulk of intrusion detection and mitigation work in real time across the entire civilian government. This effort addresses a long-time shortcoming for detecting attacks and intrusions into government computer networks. Traditionally, this activity has been a time-consuming and manpower-intensive process that would take place days or weeks after the incident.

National Security Advances in an Increasingly Connected World

March 1, 2014
By Rita Boland

Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.

NATO Focuses on Terrorist Cyber Exploitation

March 1, 2014
By Robert K. Ackerman

NATO’s efforts to defend against terrorism now are focusing on cyberspace as a tool of terrorists instead of merely as a vulnerability for striking at alliance nations and their critical infrastructure. These efforts cover aspects of cyber exploitation that range from understanding terrorists’ behavior to how they might use social media.

Seeking Smoother Interoperability Waters

February 1, 2014
By George I. Seffers

When the U.S. Coast Guard fields its newest cutter next year, the ship will be equipped with an information technology package that offers common tools and capabilities among the cutter and aviation fleets. The technology suite will improve interoperability across the service and with other agencies, and it enhances situational awareness while providing flexibility for future upgrades.

The Coast Guard’s aviation platforms already have been equipped with the second generation, or Segment 2 Command and Control System, of the technology baseline package developed under the Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) project. The project is a multiyear effort to design, develop and integrate the equipment on the Coast Guard’s newest assets, including the national security cutter (NSC), long-range surveillance aircraft and the medium-range surveillance aircraft.

More DHS Cybersecurity Student Volunteer Opportunities Available

January 13, 2014
By Rita Boland

The Department of Homeland Security has expanded its Secretary’s Honors Program Cyber Student Volunteer Initiative to more agencies. Applications are due by Friday.

Council Finds Holes in Government and Industry Cybersecurity

December 2, 2013

Members of President Obama’s Council of Advisors on Science and Technology have found that cybersecurity for government and industry organizations requires a set of processes that continuously couple information about an evolving threat to defensive reactions and responses. In a report to the president, the council shared its six findings and correlating recommendations for remedies to better security information technology in both the public and private sectors.

Homeland Security Department Seeks Software Assurance Marketplace Participants

November 14, 2013
By George I. Seffers

The U.S. Department of Homeland Security is seeking participants for the Software Assurance Marketplace (SWAMP), which is expected to open to beta users in January. The ultimate goal for the marketplace is to help protect the nation’s critical infrastructure by improving software used for essential functions.

The Bottom Line: Revolution Through Evolution

November 15, 2013
By Maryann Lawlor

The bottom line is that today's military structure is not set up to foster creative solutions and incorporate them into the bureaucracy, but a revolution quietly erupted in October. More than 80 innovators came together to discuss their ideas about how to solve some of the military's most vexing problems.

Pages

Subscribe to RSS - homeland defense