“It’s all about the network” is the rallying cry for the digital resources that enable the Army to perform its mission more effectively and efficiently. Yet, the Army Network requires a significant amount of effort, not only to develop, implement, maintain and improve it, but also to keep it secure. Those specific network or “Net-Work” tasks are the responsibility of everyone who touches the Army Network.
“It’s all about the network” is the rallying cry for the digital resources that enable the Army to perform its mission more effectively and efficiently. Yet, the Army Network requires a significant amount of effort, not only to develop, implement, maintain and improve it, but also to keep it secure. Those specific network or “Net-Work” tasks are the responsibility of everyone who touches the Army Network.
The commander of the International Security Assistance Force (ISAF) in Afghanistan has recommended that the network architecture approach established in that country be developed for future alliance and coalition operations and exercises.
Young summer campers whose focus is cybersecurity rather than swimming or working on their tan had a chance to show their skills and maybe earn a scholarship recently in Virginia. It is part of the latest in a series of U.S. Cyber Challenge Camps taking place across the country as part of an effort to get more young people to seriously consider careers in the high-demand field of cybersecurity and information assurance.
A large cyberespionage campaign has been ongoing for five or more years, with its targets ranging from private companies to nations. Commercial cybersecurity experts say all the evidence so far points to a “state player” as the source of the attack, and they have located server logs outlining the extent of the attack.
A small business innovation research (SBIR) program is allowing U.S. Army researchers to generate on-the-move satellite links that would take advantage of the greater data rates available from military communications satellites. A recent demonstration at Aberdeen Proving Ground, Maryland, proved the worth of this approach for transmitting and receiving vital situational awareness data and command and control messages.
Troops soon will have access to an upgrade that allows them to counter one of their most complex foes—Mother Nature. A project at the U.S. Air Force Electronic Systems Center incorporates weather information with flight maps so crews can more quickly understand what the environment plans to throw their way and when.
The revelation that an unnamed defense contractor suffered a large-scale data breach emphasized the urgency and importance of a Defense Department strategy for operating in cyberspace.
The revelation that an unnamed defense contractor suffered a large-scale data breach emphasized the urgency and importance of a Defense Department strategy for operating in cyberspace.