The Department of Homeland Security’s SAFETY Act is finding a new application as it may serve to protect against the potential for lawsuits arising from the National Institute of Standards and Technology Cybersecurity Framework. Lawyers are answering questions from clients about possible legal actions, and the department and institute are working together to ensure developers work with confidence.
There are no do-overs when it comes to safeguarding the U.S. military’s sensitive data. With that key, concise and blunt notion in mind, defense leaders say they are taking a slow, methodical, multipronged approach as the Defense Information Systems Agency develops a cloud security model for the whole of the Defense Department.
(ISC)² is offering a series of tips to educate the public for National Cyber Security Awareness Month.
LongView International, Reston, Virginia, has been awarded a maximum $8,291,746 modification (P0006) exercising the first option period on a one-year base contract (HT0011-13-F-0039) with three one-year options for software design, development and testing to support emerging requirements in the Defense Medical Logistics Standard Support (DMLSS), DMLSS Customer Assistance Module and Joint Medical Asset Repository applications to meet information assurance and the establishment of new data exchanges/services.
SeKON Enterprises Incorporated, Herndon, Virginia, was awarded an $12,433,560 cost-plus-fixed-fee contract, with options, to provide engineering, cybersecurity and configuration management support services to the program executive officer, Defense Healthcare Management Systems. The total potential contract value, including the one-year base period and four one-year option periods, is $75,603,463.
The U.S. Army officially activated its Cyber Protection Brigade earlier this month, marking the first time the service has had such a unit. As the defensive operations enabled by the brigade ramp up, the Army now also has a cyber branch operating provisionally, which will change the way soldiers are assigned to cyber career fields.
Without quick problem resolution, information technology pros are very often the first to be blamed for slow application performance. A SolarWinds survey found that the lack of cross-silo visibility delays app problem resolution, hindering government information technology professionals from accomplishing their missions.
The U.S. intelligence community must innovate and expand its capabilities menu just as critics are calling for greater oversight on its operations.
The FBI is focusing on cyberspace both as a tool for crime detection and prevention and as a venue for operations.
New threats such as cyberterrorism complement traditional threats such as weapons of mass destruction among the defense intelligence capabilities underpinning future intelligence activities.
Other threats to the United States may make daily headlines, but space and cyberspace are below the public radar while at the top of many lists of concerns.
The Internet of Things offers the potential of a networking revolution. But, while the theory is sound, its realization must overcome many hurdles first.
The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.
Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.
The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.
Technique Solutions Inc., Stafford, Virginia, was awarded a $25 million indefinite- delivery/indefinite-quantity, firm-fixed-price contract for the entire spectrum of equipment and services associated with the Cyber Network Defense mission and information assurance support. Funding and work location will be determined with each order, with a completion date of Sept. 14, 2019. Army Contracting Command, Key West, Florida, is the contracting activity (W912PX-14-D-0002).
The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems.
The Department of Homeland Security Science and Technology Directorate has transitioned the first technology in its Transition to Practice program to commercial market two years ahead of schedule.
The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.
Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.