Cyber

June 30, 2015
By George I. Seffers

The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.

July 1, 2015
By Capt. Ryan Robinson, USA
Signaleers at Fort Gordon, Georgia, train to use satellite communications systems. With the entire force embracing cyberspace as a warfighting domain, these signaleers ultimately must impart their understanding of cyberspace and its technological capabilities to other soldiers in operational units.

Cyberspace is being accepted throughout the U.S. Army as a warfighting domain. However, many soldiers outside of the U.S. Army Signal Corps do not grasp the concept of cyberspace as an operational realm. Empowering them with that understanding is essential to operational success.

July 1, 2015
By Sandra Jontz

Cyber attacks by foreign governments and criminals now threaten U.S. national and economic security more than terrorism, experts say, and the perils increasingly erode the country’s safety as well as its coffers. While eradicating cyberthreats is not a realistic option, developing cyber radar systems that predict and warn, with keen precision, of incoming attacks just might be.

July 1, 2015
By George I. Seffers

A U.S. cybersecurity threat analysis center that allows financial institutions around the world to share cyber attack data and solutions is adopting an automated system that permits information to be disseminated more quickly and efficiently, enhancing protection for the financial segment of the critical infrastructure.

July 1, 2015
By Robert K. Ackerman

The “2015 Verizon Data Breach Investigations Report,” released this spring, states that the top three industries affected by cybermarauders are public, information and financial services. This is unchanged from the annual report’s results last year. The report adds that the estimated financial loss from 700 million compromised records totals $400 million.

July 1, 2015
By Master Sgt. Fordham “Jester” Terrill, USAF

Adversaries are becoming smarter and more active; their rate of growth itself is disruptive. To see this, all cyber professionals have to do is pay attention.

July 1, 2015
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.

July 1, 2015
By Robert K. Ackerman
Part of the power grid is supported by electrical lines that carry power to customers through rugged terrain. Cybersecurity experts believe supervisory control and data acquisition (SCADA) systems may be the Achilles’ heels that allow malefactors to bring down such critical infrastructure via cyberspace.

A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.

June 19, 2015
By Sandra Jontz
Speaking at Federal Forum 2015, Federal CIO Tony Scott says cybersecurity is the nation's 'most important mission.'

In what has become one of the White House’s highest priorities, the federal government is forming digital services teams to address the mounting number of cybersecurity breaches threatening the nation’s security and coffers, according to government’s top chief information officer.

June 18, 2015
By George I. Seffers

On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.

June 17, 2015
By George I. Seffers
Lt. Gen. James McLaughlin, USAF, deputy commander, U.S. Cyber Command, kicked off the second day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, during which military officials highlighted the importance of command and control in defending cyberspace.

Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.

June 16, 2015
By George I. Seffers
Lt. Gen. Ronnie Hawkins Jr., USAF, director, Defense Information Systems Agency (DISA), releases an updated strategic plan for the agency.

Speakers and panelists at day one of the AFCEA International Defensive Cyber Operations Symposium outline goals and offer predictions, and the director of DISA releases an updated strategic plan for the agency.

June 19, 2015
By Robert Clark

Too many experts who are weighing in on the debate of when to consider a cyber attack an act of war are not experts at all. A nation's leadership must respond carefully using existing international guidelines.

June 9, 2015
By Brian Roach
The U.S. Navy Enterprise Data Center in San Diego at SPAWAR Systems Center Pacific provides a centrally managed and secure application hosting environment for Navy customers.

The increased dependence on interconnected networks propelled the Defense Department to seek viable solutions to not just counter the upsurge of cyberthreats, but to do so at much quicker speeds. There's a catch, though.

June 5, 2015
By Sandra Jontz

The significant federal government cyberbreach that let hackers swipe the personal data of more than 4 million current and former federal employees has all the trappings of a targeted nation-state attack aimed at gleaning critical information on federal workers; and current cyber protection methods might not be enough to prevent future attacks.

June 3, 2015
By Glenn Kesselman

If individuals or organizations are not pursuing even the most basic cyber hygiene measures, then they may need a cyber concierge to set them straight.

May 29, 2015
By Robert B. Dix Jr.

The U.S. government has been developing a national cyber response plan for nearly seven years. It's time the deliberation ended and a final version emerged to guide the nation through any potential cyber contingency.

May 18, 2015
By Tim McMillan

Humans continue to be the weakest link in cybersecurity, but they also could become its strongest asset.

May 14, 2015
By Sandra Jontz

The U.S. government is just as vulnerable to cyberthreats—if not more so—compared to two years ago, according to a new survey of federal information security professionals. Nearly half of approximately 1,800 respondents indicated that security has not improved in the federal space, while another 17 percent stated their organization’s security posture is actually worse off.

May 12, 2015
By George I. Seffers

A new study from Juniper Research, Hampshire, United Kingdom, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.

Pages