Cyber

April 1, 2015
By George I. Seffers
Maj. Gen. LaWarren Patterson, USA, the U.S. Army Cyber Center of Excellence and Fort Gordon commander, and Col. Jennifer Buckner, USA, Army Cyber School commandant, unveil a sign during a ribbon-cutting ceremony for the school.

The U.S. Army’s newly created cyber school is prepared to accept its first class of second lieutenants this summer followed by enlisted personnel and warrant officers.

April 1, 2015
By Sandra Jontz

New methods of teaching cybersecurity might be the best hope for providing the necessary security experts to turn the tide against malicious cybercriminals who have launched constant battles against vital networks.

March 19, 2015
By Sandra Jontz
From left to right, Jason Healey, Suzanne Schwartz, Joshua Corman and Pat Calhoun discuss the impact of lack cybersecurity on the Internet of Things and health care.

Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body. 

May 7, 2015
By George I. Seffers

Arduous technology transition processes tempt some companies to walk away from negotiations.

March 10, 2015
By Sandra Jontz

As if cybersecurity of late has not been tough enough, the emergence of the ubiquitous network consisting of billions of Internet connections and smart gadgets presents an alarming security threat that has failed to draw a concerted effort by experts—both in the government and industry—to address the weaknesses and protect users, experts say.

March 5, 2015
By Sandra Jontz
U.S. military Information Assurance runs proxies to protect Joint Task Force Guantanamo servers from malicious websites.

Recruiting for a qualified military and civilian workforce for the U.S. Defense Department's cybersecurity mission has proven successful so far, but retaining the force remains to be seen, cyber commanders told Congress during a hearing.

March 4, 2015
By Glenn Kesselman

You can reduce the probability of a cyber attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and making a commitment to spending more time with your employees/members of your command.

February 25, 2015
By Sandra Jontz
Example of McAfee phishing quiz, determined to be among the most successful phishing email sample to compromise victims' computers through a malicious URL.

The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.

February 24, 2015
By Maryann Lawlor

The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.

February 12, 2015
By Robert K. Ackerman

The three sea services are facing different challenges with cyber operations, but they are adopting some similar solutions as they wrestle with the newest warfighting domain.

February 12, 2015
By Sandra Jontz
NIST's Cybersecurity Framework of protective guidelines was released February 12, 2014.

The U.S. government-backed cybersecurity framework for the nation’s federal agencies and critical infrastructure sector—released one year ago today—has received a general thumbs up of approval from industry experts, who say the NIST guideline is proving a successful advent toward a better understanding of cyber risks and organizations’ vulnerabilities. 

February 12, 2015
By Robert K. Ackerman

The U.S. Navy is exploiting its own assets and other capabilities to defend and protect against cyberthreats. Some of these internal assets include automated triggers in networks as well as advanced intelligence sources.

February 12, 2015
By Robert K. Ackerman

The U.S. Navy is facing new and better cyber adversaries as it expands its own cyber footprint. These threats face the fleet and the nation, and the Navy may be called upon to respond in both cases.

February 12, 2015
By Robert K. Ackerman

The U.S. Navy is focusing on five long-term goals in its cyber operations that involve other service and national assets.

February 11, 2015
By Sandra Jontz

The White House this week announced that it is creating a federal agency to keep tabs on and counter cybersecurity threats against the United States. The Cyber Threat Intelligence Integration Center will be the clearinghouse for collaborative offensive and defensive work performed by the FBI, the National Security Agency and the Department of Homeland Security.

March 1, 2015
By George I. Seffers

U.S. DHS Science and Technology Directorate officials are helping other nations create cyber testbeds that can be linked, forming one large, international virtual laboratory for cyber systems. In addition, they already have in place bilateral agreements with a number of countries and are in discussions with France, Spain, Germany, Mexico and South Korea, which ultimately could expand international cooperation on cybersecurity research and development.

March 1, 2015
By Sandra Jontz

The U.S. Department of Homeland Security’s Continuous Diagnostics and Mitigation program is beginning a new thrust in which it addresses a growing concern of cybersecurity: identity management. The program aims to drive the overhaul of cyber risk management across federal, state, local, tribal and territorial governments and to do so cost-effectively by leveraging the technology acquisition processes­—essentially buying in bulk.

March 1, 2015
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Despite everyone’s best intentions, developing a solid critical infrastructure protection policy and plan must take into account the cultural differences, privacy and the respective needs of a diverse society, coupled with a disciplined, systematic approach to critical infrastructure protection.

January 30, 2015
By Sandra Jontz
John Hickey, program manager for Defense Department Mobility at DISA, talks about security assessment and risk acceptance for DOD migration to commercial cloud.

The Defense Department’s slow migration of much of its unclassified and nonsensitive data, along with the unclassified side of its email, to a hybrid cloud solution is talking longer than hoped, but is going to happen, promised DOD Acting Chief Information Officer Terry Halvorsen.

January 29, 2015
By Maryann Lawlor

A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.

Pages