Cyber

March 1, 2015
By Sandra Jontz

The U.S. Department of Homeland Security’s Continuous Diagnostics and Mitigation program is beginning a new thrust in which it addresses a growing concern of cybersecurity: identity management. The program aims to drive the overhaul of cyber risk management across federal, state, local, tribal and territorial governments and to do so cost-effectively by leveraging the technology acquisition processes­—essentially buying in bulk.

March 1, 2015
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Despite everyone’s best intentions, developing a solid critical infrastructure protection policy and plan must take into account the cultural differences, privacy and the respective needs of a diverse society, coupled with a disciplined, systematic approach to critical infrastructure protection.

January 30, 2015
By Sandra Jontz
John Hickey, program manager for Defense Department Mobility at DISA, talks about security assessment and risk acceptance for DOD migration to commercial cloud.

The Defense Department’s slow migration of much of its unclassified and nonsensitive data, along with the unclassified side of its email, to a hybrid cloud solution is talking longer than hoped, but is going to happen, promised DOD Acting Chief Information Officer Terry Halvorsen.

January 29, 2015
By Maryann Lawlor

A survey of 200 federal government, military and intelligence information technology and information technology security professionals shows that staff members pose a larger threat to computer systems than external threats.

February 1, 2015
By Capt. Robert M. Lee, USAF

The U.S. Air Force cyber community is failing, but not all is lost. While some aspects are in dire need of repair or replacement, effective solutions potentially are within reach—if leadership is up to the task.

January 14, 2015
By Sandra Jontz

President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough. 

January 13, 2015
By Maryann Lawlor

While cybersecurity is getting big play in the news these days—as it well should—three topics require just as much attention but have not yet hit the big time. Acquisition, spectrum and interoperability may not have the headline-grabbing charm of the hack into the U.S. Central Command’s Twitter account, but they are issues that need the same serious attention.

February 1, 2015
By James C. Bussert

While infocentric nations and military forces focus on the threat to their systems from malware-wielding cyber attackers, a significant danger to cyberspace may come from outer space in the form of kinetic weapons that attack vital satellites.

February 1, 2015
By Robert K. Ackerman
A sonar technician onboard the guided missile destroyer USS Mustin stands watch in the ship’s sonar center. With cyberspace being a warfighting domain, the U.S. Navy’s information networks are a major target that must be protected and defended proactively.

While the Navy is working with the other services and the U.S. Cyber Command to protect and defend its networks, it also is shaping its own cyberforce to deal with digital challenges outside of its normal purview.

January 12, 2015
By Sandra Jontz
Screen shot of CENTCOM's Twitter page, which had been hacked January 12, 2015.

The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.

January 12, 2015

In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.

January 9, 2015
By George I. Seffers

Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.

December 29, 2014
By Sandra Jontz

U.S. Marines are testing skill sets integrated with technology in an effort to succeed in a combined conventional warfare/cyber warfare setting, employing devices such as integrated head-mounted displays and sensors on the battlefield and avoiding information overload.

December 23, 2014
By George I. Seffers

The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.

December 12, 2014
By Maryann Lawlor

Serial has become more than an ordinary podcast. Its captivating story line has listeners joining in the conversation, an approach that could help governments solve larger problems.

December 11, 2014
By Robert K. Ackerman

If cyberspace is a warfighting domain, then warfighters should expect that it will not perform as desired. The same maneuver warfare skills common on the battlespace need to be applied to cyberspace.

December 10, 2014
By Robert K. Ackerman

The deck is stacked in favor of cyber attackers against defenders. And, that trend is likely to worsen as the march of technology enables new capabilities that empower more cybermarauders.

December 10, 2014
By Robert K. Ackerman

While terrorists can inflict individual points of damage to the U.S. homeland, cyberspace attacks hold the greatest potential for inflicting devastating damage that could change the nature of the nation.

December 10, 2014
By Robert K. Ackerman

Security experts must have full network awareness in real time if they are to thwart the growing cyberspace threat. Programs such as the joint regional security stacks (JRSS) may hold the key to securing networks against dominance by cybermarauders.

December 10, 2014
By Robert K. Ackerman

The U.S. Cyber Command has granted the head of DISA directive authority over the Department of Defense Information Network (DODIN) for cyber matters.

Pages