The U.S. Cyber Command's Cyber Mission Force is generating teams and assigning them to combatant commands, but they are still in the learning phase for their missions. Half the teams will focus on defense, and the other half will focus on initiating activities.
Success for the Joint Information Environment may come down to the Joint Regional Security Stacks (JRSS), says the Defense Department's acting CIO. However, their success may hinge on acquisition reform.
Koniag Information Security Services LLC, Chantilly, Virginia, has been awarded a ceiling $6,767,577 modification (P00005) exercising the first option period on a one-year base contract (HR0011-14-C-0048), with four one-year option periods for contractor support services for the Defense Advanced Research Projects Agency (DARPA) Security and Intelligence Directorate (SID). The modification brings the total cumulative face value of the contract to $13,481,154 from $6,713,577.
While a more secure cyberspace will emerge through an evolutionary process, the U.S. government must take immediate action to influence the rate of change.
For the U.S. Defense Department, the Internet of Things means that everything—battlefield uniforms, office thermostats and major weapon systems, for example—are networked, providing tremendous amounts of data for situational awareness while also preventing challenges for cybersecurity and data storage and analysis.
The Internet of Things, the latest iteration of the overarching dream of an omnipresent network architecture, offers an uncertain future in both opportunities and challenges. That uncertainty is growing as the network concept itself expands in scope and reach.
Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.
The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.
The U.S. Army has established a Cyber Chief Information Officer Focal within the acquisition community, responding to the ever-expanding role cyber now has in the service branch.
A new program aims to help veterans seeking work in the field of cybersecurity earn certifications. "The scholarship opens doors for veterans seeking continued service to their country ... and at the same time helps to fill the growing need for cybersecurity professionals."
The private and financial sectors are pressing for better governmental answers to the costly cybersecurity challenges still plaguing the nation. They want the White House to create, as a minimum first step, an interagency or oversight group to facilitate information sharing. This small step is seen as a critical link between industry and government to organizing the fragmented cybersecurity efforts needed to quash mounting attacks.
Cyber is becoming more critical in battle every day, and the U.S. Army is adjusting its Network Integration Evaluation to reflect that reality. The service branch is introducing new digital features to the training event from the laboratory to the field.
Adm. Michael Rogers, USN, who leads both the National Security Agency and U.S. Cyber Command, predicts a damaging attack to critical infrastructure networks within the coming years. If an attack happens, the agency and Cyber Command will coordinate a response along with other government agencies and potentially the private sector organizations that own many of the networks.
The U.S. Defense Information Systems Agency is being tasked with an operational role in the cyber domain, namely network defense. The new role creates a formal relationship between the agency, U.S. Cyber Command and the military services; integrates network operations and defense; and should ultimately improve security.
The U.S. Navy’s Task Force Cyber Awakening, which was established in July, is expected to deliver its first report to the service’s leadership this month, task force officials say. The report will include recommendations for improving the service’s cyber posture, both ashore and afloat.
The Defense Department is expected very soon to release a new policy revising the role DISA plays in brokering cloud services. The changes are designed to speed cloud service acquisitions. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.
Booz Allen Hamilton, McLean, Virginia, is being awarded a $6,643,293 task order (P00003) to a previously awarded firm-fixed-price contract (HQ0034-14-A-0023) to provide technical support services for the Department of Defense's Chief Information Officer Cybersecurity and Information Assurance Support program. Work will be performed in Alexandria, Virginia, with an expected completion date of Oct. 16, 2015.
Reginald Brothers, Department of Homeland Security (DHS) undersecretary for science and technology, today announced the new visionary goals for the department’s Science and Technology (S&T) Directorate.
NCI Inc., Reston, Va., has announced that it was awarded a cost-plus-fixed-fee, single-award indefinite delivery, indefinite quantity contract valued at $125 million for cyber network operations and security support (CNOSS) services for the U.S. Army's Network Enterprise Technology Command (NETCOM) G3/5/7. NCI has served NETCOM since 2007, with two predecessor contracts to CNOSS. The new contract has a 12-month base period with two one-year option periods and one six-month option period.
Might the recurring data breaches plaguing one large retailer after another be a dress rehearsal for a catastrophic attack that could cripple, if not destroy, the United States and its critical infrastructure? The doomsday rhetoric presented by cybersecurity experts at an issue forum Thursday hosted by the Fairfax County Chamber of Commerce, while not so calamitous, served as a wake-up call to the enduring cybersecurity vulnerabilities.