With the new year only a few days old, one of the information technology industry's biggest security firms is out with its annual predictions of the top cybersecurity threats for 2012. David Marcus, director of security research with McAfee Labs and a principal co-author of the study, says threats against industrial and industry networks top the list.
SIGNAL Online Exclusives
Out with the old (Cold War systems), in with the new: Defense Secretary Leon E. Panetta says that ISR, space and cyber will be new priority areas as the Defense Department embarks on a strategy befitting the new global security environment. Speaking at a January 5 Pentagon press conference, Panetta defined the future military as “a smaller and leaner force” with reductions coming in the U.S. Army and the U.S. Marine Corps. This force will be more agile and flexible, ready to deploy quickly, and it will feature new technologies and other advances.
Officials in the Tampa FBI office recently awarded a badge and credentials to a non-agent for what, according to their research, is the first time in the bureau’s history. Sgt. Joel Tavera, USA, received the honor in recognition of the sacrifice he made serving his country and to pay tribute to his persistent spirit. But he set the process in motion with a little playful cheek.
Although still in the planning stages, next year’s National Level Exercise will likely include analysis of the role of social media during a major cyber event, according to sources participating in the exercise. One official says social media may prove useful in predicting and reacting to a wide array of catastrophes, including terrorist attacks, natural disasters and disease outbreaks.
The U.S. Navy's rescheduling of the Next Generation Enterprise Network (NGEN) request for proposals (RFP) should not delay the program, according to a Navy official. After slating an RFP release for December 21, the Navy changed course and extended the RFP release date to sometime in late January 2012 at the earliest.
This holiday season, don’t fall prey to a criminal’s cyber scam. Protect yourself by following a few simple guidelines when shopping online and giving to charities. Actually, these rules are good all year round as well.
The small form factor of increasingly popular mobile devices such as smartphones and tablets is posing new challenges to those developing applications, or apps, for these items. Gwynne Kostin offers her advice for agencies considering the move to mobile.
When it comes to Internet content consumed on a mobile device, there may be an app for that … but there’s an important distinction that must be recognized. Mobile isn't just a "little Web," according to a GSA official.
NASA's final space shuttle mission did not mark the end of U.S. space travel. Instead, scientists and engineers now have their sights set on exploring deeper into the solar system with plans to enable trips to Mars and asteroids. A plethora of projects are testing how to supply the food, liquids and fuel necessary for such journeys.
The U.S. intelligence community faces the possibility of devastating budget cuts if the congressional Joint Select Committee on Deficit Reduction does not reach an agreement by November 23, 2011. The community is not ready for the massive reductions that would be imposed if that congressional committee fails to reach agreement, says a senior defense official.
Here’s an interesting look into the inner workings of international cyber criminals by virtue of covertly recorded conversation snippets. The characteristics of similar processes in Western governments, particularly here in the United States, are well known because they are described in detail in the media. Our processes exist to provide accountability, budget constraint, quality assurance and fair competition. The bad guys have a slightly different take on how to go about things.
The U.S. Coast Guard 1st District is making plans to extend its network of disparate yet connected radio frequencies down to its front lines. If all goes according to plan, the smaller, lighter technology could make its way into the vests of boarding-team leaders, giving them the ability to connect with higher headquarters via not only voice, but also full-motion video and videoteleconferencing.
U.S. Army officials are planning improvements to the Army’s mobile cloud computing platform commonly used in Afghanistan. The next version of the Battle Command Common Services (BCCS) system will mark the Army’s first attempt to align the cloud platform with the Common Operating Environment. It will improve interoperability between the operations and intelligence communities, ultimately improving situational awareness for warfighters.
The nation’s critical infrastructure may be in more peril than anticipated as its new technology capabilities increase network vulnerability. A similar threat may extend to longtime military networks that suddenly are not as certain to be available when needed.
It may take a village of computer experts to build the next generation of networks as access, identification, applications and security concerns weigh heavily on planners and managers alike.
The future is in the East, and the United States must adapt to ensure that it can meet the challenges of the Asia-Pacific region in the 21st century.
NASA, the National Reconnaissance Office and the U.S. Air Force have created a coordinated strategy for certifying commercial launch vehicles to send their payloads into space, including Evolved Expendable Launch Vehicle missions.
A recently released report from researchers at Georgia Institute of Technology, Atlanta, Georgia, predicts an explosion of cell phone threats in the coming months and reveals newly emerging vulnerabilities, including weaknesses in mobile device browsers.
A new U.S. Army generator technology is saving fuel and lives in the rugged terrain of Afghanistan. Known as a microgrid, the technology links smart generators to provide the appropriate amount of power when it is needed.
Naval Special Warfare (NSW) Group 4 has reduced its time to process Government Purchase Card acquisitions from months to 3.2 days with a combination of technology and employee involvement. The resulting system not only lessens the time from request submission to purchase completion, it also walks users through processes to eliminate mistakes and can create various reports automatically for a variety of purposes.