Cyber

September 15, 2014

Technique Solutions Inc., Stafford, Virginia, was awarded a $25 million indefinite- delivery/indefinite-quantity, firm-fixed-price contract for the entire spectrum of equipment and services associated with the Cyber Network Defense mission and information assurance support. Funding and work location will be determined with each order, with a completion date of Sept. 14, 2019. Army Contracting Command, Key West, Florida, is the contracting activity (W912PX-14-D-0002).

September 15, 2014
By Maryann Lawlor

The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems.

September 12, 2014
By Rita Boland

The Department of Homeland Security Science and Technology Directorate has transitioned the first technology in its Transition to Practice program to commercial market two years ahead of schedule.

September 11, 2014
By George I. Seffers

The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.

September 11, 2014
By George I. Seffers

Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.

September 10, 2014
George I. Seffers

Mission success in the cyber arena, especially in a constrained budget environment, requires both cooperation and innovation, but military and industry officials speaking at AFCEA TechNet Augusta 2014 say they are not yet seeing enough of either.

September 10, 2014
George I. Seffers

Although the U.S. Defense Department and the military industry are feeling the effects of constrained budgets, they have not yet been forced to find truly innovative solutions, Mark Bigham, chief innovation officer for Raytheon Intelligence and Information Services, told the AFCEA TechNet Augusta 2014 audience.

September 10, 2014
George I. Seffers

In his farewell address, President Dwight Eisenhower coined the phrase "military industrial complex" to describe the relationships between the military, Congress and industry. That complex no longer exists, according to Tom Davis, a former vice president for General Dynamics, speaking during an industry panel at the AFCEA TechNet Augusta 2014 conference.

September 10, 2014
By George I. Seffers

The U.S. Army is building a Cyber Center of Excellence at Fort Gordon, Georgia, and it will not come cheap, warned Maj. Gen. Stephen Fogarty, USA, the center’s new commanding general.

September 10, 2014
By George I. Seffers

Former National Security Agency contractor Edward Snowden single-handedly shocked the U.S. intelligence community by leaking reams of information to the news media, but the insider threat is much more widespread, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia.

September 10, 2014
By George I. Seffers

The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.

September 9, 2014
By George I. Seffers

U.S. Army officials struggled during the AFCEA TechNet Augusta 2014 to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the effects or challenges of emerging technologies.

September 9, 2014
By George I. Seffers

The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers.

September 9, 2014
By Sandra Jontz

The U.S. Defense Department is primed to take a first step toward the realization of JIE as it gears up information migration to the joint regional security stacks, or JRSS, a key upgrade to streamline and secure network operations.

September 9, 2014
By George I. Seffers

The U.S. Army is standing up a cyber brigade and considering a cyber branch, which has some questioning the future of the services Signal Corps, but the Signal Corps will survive, Lt. Gen. Robert Ferrell, USA, the service’s chief information officer, said during a luncheon keynote speech at the AFCEA TechNet Augusta 2014 conference.

October 1, 2014
By Paul A. Strassmann

Budget cuts and rapidly improving information technology are forcing the U.S. Defense Department to confront increasing cybersecurity demands without commensurate increases in available resources

September 9, 2014
George I. Seffers

U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, according to Lt. Gen. Edward Cardon, USA, commanding general, Army Cyber Command.

September 9, 2014
George I. Seffers

Sometimes, cyber warriors will have to pick and choose what to protect, because, “It’s increasingly clear we can’t protect everything,” said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, while addressing the AFCEA TechNet Augusta audience.

September 9, 2014
George I. Seffers

All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, speaking as a keynote at AFCEA TechNet Augusta.

October 1, 2014
By Rita Boland

As organizations migrate more data into public clouds, demands for a different type of security are emerging. A specialized option is available now for Amazon Web Services that aims to mitigate threats more quickly by finding them faster and suggesting methods of remediation.

Pages