Cyber

November 1, 2014
By Rita Boland

The Department of Homeland Security’s SAFETY Act is finding a new application as it may serve to protect against the potential for lawsuits arising from the National Institute of Standards and Technology Cybersecurity Framework. Lawyers are answering questions from clients about possible legal actions, and the department and institute are working together to ensure developers work with confidence.

November 1, 2014
By Sandra Jontz
The Defense Information Systems Agency command center at Fort Meade, Maryland, in 2013.

There are no do-overs when it comes to safeguarding the U.S. military’s sensitive data. With that key, concise and blunt notion in mind, defense leaders say they are taking a slow, methodical, multipronged approach as the Defense Information Systems Agency develops a cloud security model for the whole of the Defense Department.

October 6, 2014
By Ali Cybulski

(ISC)² is offering a series of tips to educate the public for National Cyber Security Awareness Month.

September 30, 2014

LongView International, Reston, Virginia, has been awarded a maximum $8,291,746 modification (P0006) exercising the first option period on a one-year base contract (HT0011-13-F-0039) with three one-year options for software design, development and testing to support emerging requirements in the Defense Medical Logistics Standard Support (DMLSS), DMLSS Customer Assistance Module and Joint Medical Asset Repository applications to meet information assurance and the establishment of new data exchanges/services.

September 30, 2014

SeKON Enterprises Incorporated, Herndon, Virginia, was awarded an $12,433,560 cost-plus-fixed-fee contract, with options, to provide engineering, cybersecurity and configuration management support services to the program executive officer, Defense Healthcare Management Systems. The total potential contract value, including the one-year base period and four one-year option periods, is $75,603,463.

September 23, 2014
By Rita Boland

The U.S. Army officially activated its Cyber Protection Brigade earlier this month, marking the first time the service has had such a unit. As the defensive operations enabled by the brigade ramp up, the Army now also has a cyber branch operating provisionally, which will change the way soldiers are assigned to cyber career fields.

September 23, 2014
By Chris LaPoint

Without quick problem resolution, information technology pros are very often the first to be blamed for slow application performance. A SolarWinds survey found that the lack of cross-silo visibility delays app problem resolution, hindering government information technology professionals from accomplishing their missions.

September 22, 2014
By Robert K. Ackerman
Rep. Mike Rogers (R-MI), chairman of the House Permanent Select Committee on Intelligence (l), and Rep. Dutch Ruppersberger (D-MD), ranking member of the committee, discuss intelligence oversight issues at the AFCEA/INSA Intelligence and National Security Summit 2014.

The U.S. intelligence community must innovate and expand its capabilities menu just as critics are calling for greater oversight on its operations.

September 22, 2014
By Robert K. Ackerman

The FBI is focusing on cyberspace both as a tool for crime detection and prevention and as a venue for operations.

September 22, 2014
By Robert K. Ackerman

New threats such as cyberterrorism complement traditional threats such as weapons of mass destruction among the defense intelligence capabilities underpinning future intelligence activities.

September 19, 2014
By Robert K. Ackerman

Other threats to the United States may make daily headlines, but space and cyberspace are below the public radar while at the top of many lists of concerns.

September 18, 2014
By Robert K. Ackerman

The Internet of Things offers the potential of a networking revolution. But, while the theory is sound, its realization must overcome many hurdles first.

September 18, 2014
By Robert K. Ackerman

The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.

September 18, 2014
By Robert K. Ackerman

Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.

September 17, 2014
By Rita Boland

The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.

September 15, 2014

Technique Solutions Inc., Stafford, Virginia, was awarded a $25 million indefinite- delivery/indefinite-quantity, firm-fixed-price contract for the entire spectrum of equipment and services associated with the Cyber Network Defense mission and information assurance support. Funding and work location will be determined with each order, with a completion date of Sept. 14, 2019. Army Contracting Command, Key West, Florida, is the contracting activity (W912PX-14-D-0002).

September 15, 2014
By Maryann Lawlor

The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems.

September 12, 2014
By Rita Boland

The Department of Homeland Security Science and Technology Directorate has transitioned the first technology in its Transition to Practice program to commercial market two years ahead of schedule.

September 11, 2014
By George I. Seffers

The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.

September 11, 2014
By George I. Seffers

Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.

Pages