The commander of the International Security Assistance Force (ISAF) in Afghanistan has recommended that the network architecture approach established in that country be developed for future alliance and coalition operations and exercises.
Young summer campers whose focus is cybersecurity rather than swimming or working on their tan had a chance to show their skills and maybe earn a scholarship recently in Virginia. It is part of the latest in a series of U.S. Cyber Challenge Camps taking place across the country as part of an effort to get more young people to seriously consider careers in the high-demand field of cybersecurity and information assurance.
A large cyberespionage campaign has been ongoing for five or more years, with its targets ranging from private companies to nations. Commercial cybersecurity experts say all the evidence so far points to a “state player” as the source of the attack, and they have located server logs outlining the extent of the attack.
A small business innovation research (SBIR) program is allowing U.S. Army researchers to generate on-the-move satellite links that would take advantage of the greater data rates available from military communications satellites. A recent demonstration at Aberdeen Proving Ground, Maryland, proved the worth of this approach for transmitting and receiving vital situational awareness data and command and control messages.
Troops soon will have access to an upgrade that allows them to counter one of their most complex foes—Mother Nature. A project at the U.S. Air Force Electronic Systems Center incorporates weather information with flight maps so crews can more quickly understand what the environment plans to throw their way and when.
Even as he was saying his farewells, now-former Defense Secretary Robert Gates apparently had a change of heart about moving responsibility for the Pentagon’s computer networks from the Defense Department Chief Information Officer (CIO) and the Defense Information Systems Agency (DISA) into the newly established U.S. Cyber Command (CYBERCOM).
Malware threats for mobile and messaging environments are increasing quickly, evolving in sophistication and functionality at a pace that eclipses PC-based malware, according to a report by McAfee Labs. Malicious programs for Android have become especially prevalent; historically, only two other operating systems have more malware.