Cyber

July 27, 2015
By Robert Clark

Strong legal issues must be addressed before companies take cyber active defense into their own hands.

August 1, 2015
By George I. Seffers
Making his last appearance at an AFCEA event as the director of the Defense Information Systems Agency, Lt. Gen. Ronnie D. Hawkins Jr., USAF, emphasizes that cyber is a weapon system.

While serving as the first luncheon keynote speaker at AFCEA’s Defensive Cyber Operations Symposium, Lt. Gen. Ronnie D. Hawkins Jr., USAF, outgoing director of the Defense Information Systems Agency (DISA), compared cyber and traditional weapons.

August 1, 2015
By Karyn Richardson

The password is vanishing. The cumbersome, multicharacter, hard-to-remember bane of Internet usage finally is dying. As biometric and behavioral monitoring technologies evolve, solutions that embrace revolutionary new identity verification systems based on users’ behaviors at the keyboards promise to replace the expiring relic.

August 1, 2015
By Maj. William Smith, USMC

A conflict erupting on the Korean Peninsula could lead to any of a number of developments and outcomes, and its effects—including cyber operations—might not be limited to the Koreas and the U.N. forces involved there.

August 1, 2015
By Sandra Jontz

Wireless links now are permeating virtually every electronic device in society, but they bring with them the vulnerabilities and threats that characterize cyberspace today.

July 22, 2015
By George I. Seffers

New cyber crime facility provides enhanced operational and training capabilities to meet the growing cyber mission. 

July 21, 2015
By Sandra Jontz

U.S. lawmakers launched a bipartisan bid to boost the Department of Homeland Security's powers to better oversee cybersecurity compliance by federal agencies and intervene when they might fail to safeguard their networks.  

July 14, 2015
Maryann Lawlor

The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...

July 13, 2015
By Dr. Wesley Kaplow

The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.

July 9, 2015
By Sandra Jontz

Hackers behind cybersecurity attacks on the U.S. federal government through the Office of Personnel Management pilfered personal information from a much more significant number of current and former employees than previously reported.

July 2, 2015
By Robert Clark

Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?

June 30, 2015
By George I. Seffers

The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.

July 1, 2015
By Capt. Ryan Robinson, USA
Signaleers at Fort Gordon, Georgia, train to use satellite communications systems. With the entire force embracing cyberspace as a warfighting domain, these signaleers ultimately must impart their understanding of cyberspace and its technological capabilities to other soldiers in operational units.

Cyberspace is being accepted throughout the U.S. Army as a warfighting domain. However, many soldiers outside of the U.S. Army Signal Corps do not grasp the concept of cyberspace as an operational realm. Empowering them with that understanding is essential to operational success.

July 1, 2015
By Sandra Jontz

Cyber attacks by foreign governments and criminals now threaten U.S. national and economic security more than terrorism, experts say, and the perils increasingly erode the country’s safety as well as its coffers. While eradicating cyberthreats is not a realistic option, developing cyber radar systems that predict and warn, with keen precision, of incoming attacks just might be.

July 1, 2015
By George I. Seffers

A U.S. cybersecurity threat analysis center that allows financial institutions around the world to share cyber attack data and solutions is adopting an automated system that permits information to be disseminated more quickly and efficiently, enhancing protection for the financial segment of the critical infrastructure.

July 1, 2015
By Robert K. Ackerman

The “2015 Verizon Data Breach Investigations Report,” released this spring, states that the top three industries affected by cybermarauders are public, information and financial services. This is unchanged from the annual report’s results last year. The report adds that the estimated financial loss from 700 million compromised records totals $400 million.

July 1, 2015
By Master Sgt. Fordham “Jester” Terrill, USAF

Adversaries are becoming smarter and more active; their rate of growth itself is disruptive. To see this, all cyber professionals have to do is pay attention.

July 1, 2015
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.

July 1, 2015
By Robert K. Ackerman
Part of the power grid is supported by electrical lines that carry power to customers through rugged terrain. Cybersecurity experts believe supervisory control and data acquisition (SCADA) systems may be the Achilles’ heels that allow malefactors to bring down such critical infrastructure via cyberspace.

A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.

June 19, 2015
By Sandra Jontz
Speaking at Federal Forum 2015, Federal CIO Tony Scott says cybersecurity is the nation's 'most important mission.'

In what has become one of the White House’s highest priorities, the federal government is forming digital services teams to address the mounting number of cybersecurity breaches threatening the nation’s security and coffers, according to government’s top chief information officer.

Pages