The Defense Department’s slow migration of much of its unclassified and nonsensitive data, along with the unclassified side of its email, to a hybrid cloud solution is talking longer than hoped, but is going to happen, promised DOD Acting Chief Information Officer Terry Halvorsen.
A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.
President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough.
While cybersecurity is getting big play in the news these days—as it well should—three topics require just as much attention but have not yet hit the big time. Acquisition, spectrum and interoperability may not have the headline-grabbing charm of the hack into the U.S. Central Command’s Twitter account, but they are issues that need the same serious attention.
The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.
In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.
Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.
U.S. Marines are testing skill sets integrated with technology in an effort to succeed in a combined conventional warfare/cyber warfare setting, employing devices such as integrated head-mounted displays and sensors on the battlefield and avoiding information overload.
The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.
Serial has become more than an ordinary podcast. Its captivating story line has listeners joining in the conversation, an approach that could help governments solve larger problems.
If cyberspace is a warfighting domain, then warfighters should expect that it will not perform as desired. The same maneuver warfare skills common on the battlespace need to be applied to cyberspace.
The deck is stacked in favor of cyber attackers against defenders. And, that trend is likely to worsen as the march of technology enables new capabilities that empower more cybermarauders.
While terrorists can inflict individual points of damage to the U.S. homeland, cyberspace attacks hold the greatest potential for inflicting devastating damage that could change the nature of the nation.
Security experts must have full network awareness in real time if they are to thwart the growing cyberspace threat. Programs such as the joint regional security stacks (JRSS) may hold the key to securing networks against dominance by cybermarauders.
The U.S. Cyber Command has granted the head of DISA directive authority over the Department of Defense Information Network (DODIN) for cyber matters.
The U.S. Cyber Command's Cyber Mission Force is generating teams and assigning them to combatant commands, but they are still in the learning phase for their missions. Half the teams will focus on defense, and the other half will focus on initiating activities.
Success for the Joint Information Environment may come down to the Joint Regional Security Stacks (JRSS), says the Defense Department's acting CIO. However, their success may hinge on acquisition reform.
Koniag Information Security Services LLC, Chantilly, Virginia, has been awarded a ceiling $6,767,577 modification (P00005) exercising the first option period on a one-year base contract (HR0011-14-C-0048), with four one-year option periods for contractor support services for the Defense Advanced Research Projects Agency (DARPA) Security and Intelligence Directorate (SID). The modification brings the total cumulative face value of the contract to $13,481,154 from $6,713,577.
While a more secure cyberspace will emerge through an evolutionary process, the U.S. government must take immediate action to influence the rate of change.
For the U.S. Defense Department, the Internet of Things means that everything—battlefield uniforms, office thermostats and major weapon systems, for example—are networked, providing tremendous amounts of data for situational awareness while also preventing challenges for cybersecurity and data storage and analysis.