Cyber

March 1, 2013
By Max Cacas

An Army research team develops a device that could assist warfighters' decision making.

February 1, 2013
BY Rita Boland
Crews work in New Jersey to restore power that was knocked out during Hurricane Sandy. GridCloud, a project between Cornell University and Washington State University, employs cloud technology to make smart grids self-healing and more resilient in the event of natural or man-made disasters. Photo Credit: FEMA/Liz Roll

A cloud project takes advantage of emerging concepts to protect energy against disruptive threats.

March 1, 2013
By Max Cacas

When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor

The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.

February 28, 2013
By George I. Seffers

The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.

February 27, 2013
By George I. Seffers

Gen. Michael Hayden, USAF (Ret.), former director of the CIA, indicated an astounding extent of Chinese cyber espionage and said he believes the Iranians are attacking U.S. banks with unsophisticated but pervasive cyber attacks.

February 26, 2013
By George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 1

All too often, cyber and physical protection are considered separately, when really they go hand-in-hand, according to experts speaking at the first day of the AFCEA Homeland Security Conference in Washington, D.C., February 26, 2013. The conference opened with a half-day of conversation about hackers, terrorists and natural disasters and addressed concerns involving both physical infrastructure and the cyber environment for all kinds of attacks, be they physical, virtual or even natural in origin.

February 13, 2013
By Max Cacas

One day after unveiling a long-awaited executive order concerning a wide-range of cybersecurity concerns, President Barack Obama’s top cybersecurity advisers admit that the order only goes so far in dealing with pressing Internet security needs. They say that the order is only a “down payment” and no substitute for permanent congressional legislation on the matter.

February 1, 2013
By George I. Seffers
The Joint Cyberoperations Range can include live training, such as a fighter jet flying over a training range, along with virtual and constructive cyber training.

A cyberspace operations facility grows with the burgeoning mission.

The U.S. Defense Department’s network operations training and education capabilities must continually evolve in the ever-shifting cyber realm. To meet that need, one of the department’s premier cyber ranges harnesses the power of simulation to support a full array of training, education, certification and military exercises for the warfighters.

February 1, 2013
By Maj. Jose Gonzalez, USAF

Commanders wrestling with control of cyberspace elements now have a new tool to help them secure their corner of cyberspace in an operational setting. The Adaptive Network Defense of Command and Control concept of operations enables joint force commander control of key terrain in cyberspace, based on assessments at an operational tempo. To achieve a joint force command objective, network operators concentrate cybersecurity and monitoring of command and control systems to maintain the initiative against adversarial attacks and provide enhanced situational awareness.

February 1, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 3

January 31, 2013
By Robert K. Ackerman
John Smart, president of the Acceleration Studies Foundation, tells the keynote luncheon audience that dramatic change is evolutionary and inevitable.

 

 

 

January 30, 2013

 

The U.S. Air Force expects to add about 1,000 people, mostly civilians, to its cyberforces in the coming years.

 

January 30, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 1

Quote of the Day:“’Flat’ is the new ‘up’ in this defense budget environment.”— Robert O. Work, undersecretary of the Navy

The military services are facing potentially crippling constraints if sequestration takes place in March. Defense officials foresee the likelihood of draconian budget cuts being imposed that will cripple the force just as it is being counted on to assume new strategic missions. In most cases, the services will have to choose to sacrifice some capabilities so that others will remain part of the force. In worse-case scenarios, the U.S. military may be unable to meet its obligations when a crisis emerges.

These and other points were hammered home by speakers and panels on the first day of West 2013, the annual conference and exposition hosted by AFCEA and the U.S. Naval Institute in San Diego. While the event has the theme of “Pivot to the Pacific: What Are the Global Implications,” the first day’s discussions largely focused on the dire consequences of the fiscal cliff as well as potential solutions to avoid completely gutting the military force. Audiences generally were aware of the looming budget crisis, but many were surprised by the bluntness of the assessments offered by high-ranking Defense Department civilian and military leaders.

January 15, 2013

The AFCEA Cyber Committee is now accepting applications for participation. The committee coordinates and enhances AFCEA’s outreach to the cybercommunity, cultivates partnership opportunities among government, industry and academia, and serves as a forum to develop new ideas regarding cyber challenges and capabilities. In addition, the Cyber Committee is the association’s principal cyber resource in support of chapters and members through various forums and other information exchange services.

January 3, 2013
By Max Cacas

The purpose of the attack is purely robbery, says a cyber expert, who has shared his McAfee report with government officials.

January 1, 2013
By Robert K. Ackerman

The shift of U.S. power to the Asia-Pacific will not be successful without an infusion of new technology and a dedicated effort to defeat a wide range of adversaries. The new strategic emphasis on the Asia-Pacific region poses a new set of challenges, mandating solutions that run the gamut from technological capabilities to cultural outreach and diplomacy.

December 1, 2012
By Paul A. Strassmann

A few staff experts can formulate new strategies in a short time. Over the years, the U.S. Defense Department has accumulated a large collection of long-range planning documents. However, none of the plans ever was fully implemented, as new administrations kept changing priorities.

The just announced Defense Department Cloud Computing Strategy presents a long list of radically new directions. Ultimately, it will take hundreds of thousands of person-years to accomplish what has been just outlined. Several points stand out.

November 30, 2012
By Max Cacas

Air Force cybersecurity training may be conducted 24 hours a day, seven days a week if needed to meet burgeoning demand for cybersecurity experts in the near future, according to the service’s chief information officer. Growing threats also may drive the need for adoption of rapid acquisition practices, which are being developed by a special corps of acquisition experts.

November 29, 2012
By Max Cacas

A newly released study on America’s electrical power transmission system strongly suggests that the government and industry take steps to safeguard it from shortcomings that make it vulnerable to things such as terrorist attack and acts of nature. Potential solutions will require not only ingenuity and technology, but investment and political decisiveness.

November 21 ,2012
By Maryann Lawlor

The (ISC)2 Foundation’s information security 2013 scholarship program application process will open on January 1, 2013, offering a total of $120,000 in awards to women, graduate students, young professionals and faculty.

 

Pages