Cyber

July 30, 2013
By Robert K. Ackerman

The FBI has created an information sharing portal for cyber defense modeled on its Guardian counterterrorism portal. Known as iGuardian, the trusted portal represents a new FBI thrust to working more closely with industry on defeating cyberthreats. It is being piloted within the longtime InfraGard portal, according to an FBI cyber expert.

 

July 30, 2013
By Robert K. Ackerman

Hackers need to pay a greater price for intrusions if network security is to be effective, said a former director of national intelligence. Adm. Dennis Blair, USN (Ret.), who also is a former commander of the U.S. Pacific Command, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the nation needs to raise the cost to the hacker without breaking the bank for the defender.

July 30, 2013
By Robert K. Ackerman

Legislation that creates both positive and negative incentives may be necessary for industry to incorporate effective network security. The role of the insurance industry also can be brought to bear to convince companies it is in their best interest to ensure the sanctity of their data.

July 30, 2013
By Robert K. Ackerman

Many elected officials who opposed the National Security Agency’s (NSA’s) broad surveillance efforts were “demagogues” who did not know the real issues involved, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the people in the House who voted to cut funding for the NSA’s surveillance efforts preferred taking a stand to understanding the situation.

July 30, 2013
By Robert K. Ackerman

The U.S. Senate is moving on a cyber bill that is more in line with the approach being taken by the House, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum at the National Press Club in Washington, D.C., that this bill may be marked up by the Senate Commerce Committee this week.

July 26, 2013
By Henry S. Kenyon

Government officials now admit they underestimated the scope and complexity of the federal data center realm.

 

July 18, 2013

General Dynamics Advanced Information Systems has created a portal to facilitate collaboration among experts from multiple industries in a secure, controlled, cooperative environment. GDNexus matches innovative solutions to customer requirements across the defense, federal government, intelligence community and commercial markets.

July 17, 2013

Frank Kendall, undersecretary of defense for acquisition, technology and logistics, told the Senate Banking, Housing and Urban Affairs Committee that he is concerned about the level of cyber attacks affecting defense suppliers. As a result, he is considering changes in contracting procedures to mitigate the risk of corporate espionage.

July 15, 2013

A new white paper titled “Insider Threat: Protecting U.S. Business Secrets and Sensitive Information” focuses on raising risk awareness by highlighting current issues and outlining continuous challenges.

July 15, 2013

AFCEA International is partnering with Carnegie Mellon University’s Software Engineering Institute to offer its members a comprehensive range of online cybersecurity training on an annual subscription basis. For the cost of one five-day classroom course, students have unlimited access to more than 30 classes.

July 1, 2013
By Paul A. Strassmann

The planners of the Defense Department Joint Information Environment, or JIE, must specify the requirements that can cope with the surges in asymmetric cyberwarfare—now. Asymmetric warfare describes conflicts in which the resources of the two belligerents differ in terms of their weapons and organization. The opponents will attempt to exploit each other’s weaknesses.

July 1, 2013
By Max Cacas

The Army adjusts its training and career path for cyber domain troops and leaders.

July 1, 2013
By George I. Seffers
The National Security Agency's Information Assurance Directorate is responsible for securing data for the entire national communications system.

While many cybersecurity experts preach the gloom and doom of more advanced adversaries attacking U.S. networks, one government official contends that U.S. network defenders can meet the challenge. Training, education and technological improvements are showing dividends in a better-prepared cyber workforce.

July 1, 2013
By Robert K. Ackerman
The Defense Information Systems Agency (DISA) command center at Fort Meade, Maryland, is the focal point for the agency’s efforts to maintain network connectivity throughout the U.S. defense community. DISA’s information assurance work has taken a new turn as capabilities such as commercial communications technologies and the cloud have altered the cyberscape.

The increasing use of readily available and inexpensive commercial technologies by the military is changing the way the Defense Information Systems Agency provides information assurance. As these technologies are integrated into the Defense Department information infrastructure, the agency is adjusting its approaches to providing security for its networks and the data that reside on them.

July 1, 2013
By Rita Boland
Sandia National Laboratory’s Cyber Engineering Research Laboratory (CERL) is focusing on enhancing enterprise security through an emphasis on collaboration internally and externally. CERL sits in a non-restricted area allowing easy access for academic, industry and government personnel.

Protection is as much about 
who you know as what you know.

July 1, 2013
By George I. Seffers
Law enforcement agencies and private contractors may play a larger role in solving nation state-sponsored hacks affecting national security.

Industry officials foresee 
changes in network security.

Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.

June 27, 2013
By George I. Seffers

Cyber Symposium 2013 Online Show Daily, Day 3

Gen. Keith Alexander, USA, who directs the National Security Agency (NSA) and commands U.S. Cyber Command, wrapped up the final day of the AFCEA International Cyber Symposium with a strongly-worded defense of the U.S. intelligence community, which is under fire following recently-leaked documents concerning the collection of data on the online activities of ordinary citizens in the United States and abroad. The general deviated from the topic of cyber long enough to address the controversy.

June 27, 2013
By Robert K. Ackerman

The U.S. Navy has programmed change into its $3.45 billion Next-Generation Enterprise Network (NGEN) contract.

 

June 27, 2013
By George I. Seffers

The United States is one of the best in the world at protecting civil liberties, Gen. Keith Alexander, USA, director of National Security Agency (NSA) and commander of the U.S. Cyber Command said at the AFCEA Cyber Symposium in Baltimore.

Edward Snowden, the NSA contractor who leaked reams of data about NSA monitoring activities to the press, has been called a hero whistleblower by some, but Gen. Alexander contends that the employees at the NSA, FBI, CIA and Defense Department, who protect the nation while protecting civil liberties, are the real heroes.

June 27, 2013
By George I. Seffers

Maj. Gen. Burke Wilson, USAF, director, space operations, Headquarters U.S. Air Force, told the audience that cyber is all about improving operational effectiveness in other domains. “Mission outcome is the only reason we invest in this. We believe it will generate in better mission outcomes across the service,” he stated.

Pages