Cyber

June 1, 2013
By Robert K. Ackerman
U.S. Air Force personnel conduct cyber operations in an exercise at Joint Base San Antonio-Lackland. The Air Force is looking to restructure both its cyber organization and its cyber operations to account for changes in the virtual domain.

Roles are changing as the service reshapes its digital future.

The U.S. Air Force is subjecting itself to a cyber reality check with an eye toward restructuring the discipline both operationally and organizationally. A working group is parsing the service’s activities in this domain, and this effort involves interaction with the other services as well as the commercial sector.

May 15, 2013
By Maryann Lawlor

It’s time for military leaders, and yes, even members of the intelligence community, to come out from behind the curtain. They not only need to share with the public what networks and radios and tanks and guns mean to a warfighter’s safety but also what they mean to global security.

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

May 1, 2013

The National Institute of Standards and Technology (NIST) has released the most comprehensive update to the government’s computer security guide since 2005. The fourth revision of “Security and Privacy Controls for Federal information Systems and Organizations” (SP 800-53) addresses issues such as mobile and cloud computing, applications security, supply chain risks and privacy concerns.

May 1, 2013
By Max Cacas
NATO coalition participants in CWIX 2012 man the Land Component Room at the Joint Forces Training Center in Bydgosczc, Poland. The facility will again host CWIX 2013 next month. (NATO Photo)

A military exercise designed to refine and improve the way coalition partners share vital information will, for the first time, include the network that is supporting troops in Afghanistan. Scheduled to take place in Poland next month, the event will feature military command and control communications experts from NATO, partner organizations and nations who share the goal of rigorously testing communications interoperability among coalition members.

April 15, 2013

SANS NetWars, an interactive security challenge, gives participants the chance to compete while earning continuing education units (CEUs) to help sustain certifications. The event will take place May 15 and 16, 2013, at the Virginia Beach Convention Center during AFCEA’s East: Joint Warfighting event.

April 4, 2013
By Robert K. Ackerman

Future conflicts likely will be fought in degraded information technology environments, which will require the U.S. Navy to develop and exploit new capabilities to continue to operate in contested cyberspace. Technologies such as a flexible information grid, assured timing services and directed energy weapons must be part of the naval information system arsenal if the sea service is to maintain information dominance through the year 2028.

April 1, 2013
By Kent R. Schneider

Those of us who have been involved with government information technology (IT) for some time clearly remember the many efforts to improve IT acquisition. All certainly remember Vivek Kundra’s IT Management Reform Program, the 25-point plan. Most would agree that progress has been made, but some would argue—correctly I believe—that work remains to be done.

April 1, 2013
By Robert K. Ackerman
The U.S. Army is striving to develop a multifunction electronic warfare, or MFEW, system that will provide a defensive electronic attack capability.

Melding the disciplines of spectrum combat will enable greater flexibility and more capabilities.

The growth in battlefield electronics has spurred a corresponding growth in electronic warfare. In the same manner that innovative technologies have spawned new capabilities, electronic warfare is becoming more complex as planners look to incorporate new systems into the battlespace.

April 1, 2013
By Rita Boland
The U.S. Marine Corps is developing a private cloud computing environment to provide better information services to the tactical edge. Here, communicators set up a Support Wide Area Network System during a training exercise.

As they put the necessary pieces in place, Marines are mindful of tight resources and are seeking help from industry.

For the past year, U.S. Marine Corps technical personnel have been implementing a strategy to develop a private cloud. The initiative supports the vision of the commandant while seeking to offer better services to troops in disadvantaged areas of the battlefield.

March 26, 2013
By Max Cacas

One of the U.S. Defense Department’s top information technology officials says work is beginning on a multiaward contract for commercial cloud computing services, but the official says he has no timeline or total value for the business.

March 25, 2013

The malware that infiltrated computer systems across South Korea’s banking and television broadcast industries on March 20 shares similarities with the Shamoon program used last year to wipe clean the hard drives of 30,000 Saudi Aramco workstations, according to experts at General Dynamics Fidelis Cybersecurity Solutions. Investigators at the company’s newly-opened cyber forensics laboratory in Columbia, Maryland, say the malware is not a Shamoon variant, but that the two programs share some characteristics.

March 20, 2013
By George I. Seffers

The U.S. National Nuclear Security Administration (NNSA) began working on its Yourcloud solution about two years ago and expects to have the cloud computing solution in place by year's end. You can read more about this in "U.S. Nuclear Agency Enhances Cybersecurity With Cloud Computing
." 

March 5, 2013
By Robert K. Ackerman

The United States quickly must adopt a segmented approach to its military forces to ensure that key elements can survive a comprehensive cyber attack, according to a recently released Defense Science Board (DSB) Task Force on Resilient Military Systems. This approach entails a risk reduction strategy that combines deterrence, refocused intelligence capabilities and improved cyber defense.

March 4, 2013

Despite continued budget crunching, U.S. Defense Department officials are continuing to implement a three-phase plan to equip the department’s 600,000 mobile-device users with secure classified and protected unclassified mobile solutions that leverage commercial products. In conjunction with the Defense Information Systems Agency, the department’s chief information officer is establishing a basic multivendor mobility capability with the Defense Department for assessment.

March 1, 2013
George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 3

Although many in government are moving as quickly as possible to adopt new technologies, such as cloud computing and mobile devices, individual agencies still face cultural challenges that sometimes prevent them from moving forward, according to officials speaking as part of the Chief Information Officer Council at the AFCEA Homeland Security conference in Washington, D.C.

March 1, 2013
By Max Cacas

An Army research team develops a device that could assist warfighters' decision making.

February 1, 2013
BY Rita Boland
Crews work in New Jersey to restore power that was knocked out during Hurricane Sandy. GridCloud, a project between Cornell University and Washington State University, employs cloud technology to make smart grids self-healing and more resilient in the event of natural or man-made disasters. Photo Credit: FEMA/Liz Roll

A cloud project takes advantage of emerging concepts to protect energy against disruptive threats.

March 1, 2013
By Max Cacas

When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor

The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.

February 28, 2013
By George I. Seffers

The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.

Pages