Cyber

June 26, 2013
By George I. Seffers

The U.S. Defense Department is building a single security architecture that ultimately will eliminate firewalls in the future, according to Lt. Gen. Ronnie Hawkins Jr., USAF, Defense Information Systems Agency (DISA) director.

June 26, 2013
By George I. Seffers

Lt. Gen. Ronnie Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA), spent some time during his luncheon keynote address talking about the Joint Information Environment (JIE), which the agency already has been working on for some time.

June 26, 2013
By George I. Seffers

The Defense Information Systems Agency (DISA) will likely announce within the next couple of weeks who will operate the Defense Department’s mobile app store, said Lt. Gen. Ronnie Hawkins Jr., USAF, DISA director.

June 26, 2013
By George I. Seffers

Maj. Gen. Jennifer Napper, USA, director of plans and policy, U.S. Cyber Command, and other panelists at the AFCEA International Cyber Symposium in Baltimore said that cyber requires cooperation across the U.S. government, with the private sector and with other nations, including China and Russia.

June 25, 2013
By George I. Seffers

Cyber Symposium 2013 Online Show Daily, Day 1

Maj. Gen. John Davis, USA, senior military advisor for cyber to the U.S. undersecretary of defense for policy, set the tone at the 2013 AFCEA International Cyber Symposium, Baltimore, when he told the crowd that his position—which was just approved last August—indicates how seriously senior leaders view the cyber arena to be.

June 25, 2013
George I. Seffers

U.S. government officials are traveling the country warning companies about a new round of cyberattacks that have targeted 27 companies, compromised seven and may ultimately affect up to 600 asset owners, according to Neil Hershfield, deputy director, control systems security program (CSSP), Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), Homeland Security Department.

Hershfield made the comments while taking part in a critical infrastructure protection panel discussion as part of the July 25-27 AFCEA International Cyber Symposium, Baltimore.

June 25, 2013
By George I. Seffers

The United States will continue to develop a bilateral relationship with China regarding cybersecurity issues. In fact, the two countries will meet again in Washington, D.C., on July 8th, according to Maj. Gen. John Davis, USA, senior military advisor to the undersecretary of defense—policy for cyber, Office of the Secretary of Defense. Gen. Davis, the luncheon keynote speaker on the first day of the July 24-27 AFCEA International Cyber Symposium in Baltimore, said the United States recognizes China as a rising power and a major voice in the cyber arena.

June 17, 2013
By George I. Seffers

NATO and eight coalition nations participating in the Coalition Warrior Interoperability eXploration, eXperimentation and eXamination, eXercise (CWIX) are working to reduce the amount of time it takes to join coalition networks in the future. On average, it took a year or more for a nation to join the Afghan Mission Network, but officials hope to trim that down to a matter of weeks, says Lt. Col, Jenniffer Romero, USAF, the CWIX Future Mission Network focus area lead.

June 12, 2013
By Robert K. Ackerman

In the midst of a raging controversy over widespread National Security Agency (NSA) monitoring, the head of the NSA and U.S. Cyber Command defends cyber surveillance efforts and calls for greater consolidation of cyber activities among diverse organizations.

June 12, 2013
By Rita Boland

Cyberwarfare is a primary concern for the U.S. Marine Corps as it continues its rebalance toward the Asia-Pacific region. With the growing involvement of cyber in every operation along with specific concerns of virtual attacks from large nations in the region, emphasis on the new domain is becoming increasingly important.

June 1, 2013
By Robert K. Ackerman
A U.S. Air Force network administrator employs a laptop at Kandahar Airfield, Afghanistan.

The U.S. Cyber Command is developing a strategy that acknowledges the convergence of network systems by empowering a similar convergence of military disciplines to help place U.S. cyberspace operators on a level field with their malevolent counterparts. This strategy acknowledges that the structure of the cyberforce has not kept pace with technology developments. As all types of information management—networking, communications and data storage—became digitized, previously disparate disciplines assumed greater commonality. With more common aspects, these disciplines share similar vulnerabilities as well as potential solutions.

June 1, 2013
By Kent R. Schneider

U.S. Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), recently testified in Congress that cyber attacks have become the greatest single threat facing the United States. He went on to say the threat is particularly acute for the nation’s critical infrastructure and reminded Congress that the majority of critical infrastructure in the United States is privately owned.

June 1, 2013
By George I. Seffers
The Internet is much like the early days of the airline industry and will need to be regulated to keep networks safe, says Roger Krone, president of the Network and Space Systems business unit within the Boeing Company, Chicago.

With attacks on critical data increasing in numbers, intensity and sophistication, securing networks is becoming a global effort while fostering greater information sharing among agencies, governments and the public and private sectors. The future of cybersecurity offers greater opportunities for industry and greater cooperation on national security and critical infrastructure protection, say executives at some of the largest U.S. defense companies.

June 1, 2013
By Max Cacas

The U.S. Air Force’s migration to a new enterprise network known as AFNET will be at least two years late in completion because the project turned out to be more complicated than planners anticipated.

June 1, 2013
By Rita Boland

The U.S. Transportation Command has taken a novel approach to its Joint Cyber Center, reflecting the unusual needs of this organization that plays a role across U.S. military operations. Officials have found their decisions, such as uniting disparate experts in a single physical location, help save resources while increasing cooperation with the many industry partners that have integral roles in the efforts to keep supplies and people moving.

June 1, 2013
By Max Cacas

The U.S. Army is making its facility at West Point the focus of a joint program with the other services, industry and academia, devoted to sharing advanced cybertraining and research. Training in the new cyber realm includes not only basic best practices concerning passwords and mobile device security but also advanced training in the latest network management protocols and technology for members of the Army’s Signal Corps.

June 1, 2013
By Robert K. Ackerman
Fig. 1 [circuit-traces-640.jpg]: Cyberspace is the new invasion route for marauders to attack the nation’s critical infrastructure, and that potential threat now is increasing to the point of likelihood.

Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.

June 1, 2013
By Robert K. Ackerman
U.S. Air Force personnel conduct cyber operations in an exercise at Joint Base San Antonio-Lackland. The Air Force is looking to restructure both its cyber organization and its cyber operations to account for changes in the virtual domain.

Roles are changing as the service reshapes its digital future.

The U.S. Air Force is subjecting itself to a cyber reality check with an eye toward restructuring the discipline both operationally and organizationally. A working group is parsing the service’s activities in this domain, and this effort involves interaction with the other services as well as the commercial sector.

May 15, 2013
By Maryann Lawlor

It’s time for military leaders, and yes, even members of the intelligence community, to come out from behind the curtain. They not only need to share with the public what networks and radios and tanks and guns mean to a warfighter’s safety but also what they mean to global security.

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

Pages