Cyber

January 9, 2015
By George I. Seffers

Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.

December 29, 2014
By Sandra Jontz

U.S. Marines are testing skill sets integrated with technology in an effort to succeed in a combined conventional warfare/cyber warfare setting, employing devices such as integrated head-mounted displays and sensors on the battlefield and avoiding information overload.

December 23, 2014
By George I. Seffers

The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.

December 12, 2014
By Maryann Lawlor

Serial has become more than an ordinary podcast. Its captivating story line has listeners joining in the conversation, an approach that could help governments solve larger problems.

December 11, 2014
By Robert K. Ackerman

If cyberspace is a warfighting domain, then warfighters should expect that it will not perform as desired. The same maneuver warfare skills common on the battlespace need to be applied to cyberspace.

December 10, 2014
By Robert K. Ackerman

The deck is stacked in favor of cyber attackers against defenders. And, that trend is likely to worsen as the march of technology enables new capabilities that empower more cybermarauders.

December 10, 2014
By Robert K. Ackerman

While terrorists can inflict individual points of damage to the U.S. homeland, cyberspace attacks hold the greatest potential for inflicting devastating damage that could change the nature of the nation.

December 10, 2014
By Robert K. Ackerman

Security experts must have full network awareness in real time if they are to thwart the growing cyberspace threat. Programs such as the joint regional security stacks (JRSS) may hold the key to securing networks against dominance by cybermarauders.

December 10, 2014
By Robert K. Ackerman

The U.S. Cyber Command has granted the head of DISA directive authority over the Department of Defense Information Network (DODIN) for cyber matters.

December 10, 2014
By Robert K. Ackerman

The U.S. Cyber Command's Cyber Mission Force is generating teams and assigning them to combatant commands, but they are still in the learning phase for their missions. Half the teams will focus on defense, and the other half will focus on initiating activities.

December 9, 2014
By Robert K. Ackerman

Success for the Joint Information Environment may come down to the Joint Regional Security Stacks (JRSS), says the Defense Department's acting CIO. However, their success may hinge on acquisition reform.

December 8, 2014

Koniag Information Security Services LLC, Chantilly, Virginia, has been awarded a ceiling $6,767,577 modification (P00005) exercising the first option period on a one-year base contract (HR0011-14-C-0048), with four one-year option periods for contractor support services for the Defense Advanced Research Projects Agency (DARPA) Security and Intelligence Directorate (SID). The modification brings the total cumulative face value of the contract to $13,481,154 from $6,713,577.

January 1, 2015
By Lt. Col. William A. Barnes, USMC

While a more secure cyberspace will emerge through an evolutionary process, the U.S. government must take immediate action to influence the rate of change.

January 1, 2015
By George I. Seffers
The U.S. Navy program executive office that supports the V-22 and myriad other aircraft is learning to cope with the cyber vulnerabilities of its networked platforms.

For the U.S. Defense Department, the Internet of Things means that everything—battlefield uniforms, office thermostats and major weapon systems, for example—are networked, providing tremendous amounts of data for situational awareness while also preventing challenges for cybersecurity and data storage and analysis.

January 1, 2015
By Sandra Jontz

The Internet of Things, the latest iteration of the overarching dream of an omnipresent network architecture, offers an uncertain future in both opportunities and challenges. That uncertainty is growing as the network concept itself expands in scope and reach.

November 19, 2014
By George I. Seffers

Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.

November 18, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.

December 1, 2014
By Rita Boland

The U.S. Army has established a Cyber Chief Information Officer Focal within the acquisition community, responding to the ever-expanding role cyber now has in the service branch.

November 17, 2014
By Sandra Jontz

A new program aims to help veterans seeking work in the field of cybersecurity earn certifications. "The scholarship opens doors for veterans seeking continued service to their country ... and at the same time helps to fill the growing need for cybersecurity professionals."

December 1, 2014
By Sandra Jontz

The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.

Pages