Cyber

October 10, 2014
By Sandra Jontz

The recent rash of cyber attacks on major U.S. companies has drawn renewed focus on network vulnerabilities, both in commercial and governmental sectors, and not just on external attackers but on potentially more ominous threats posed by insiders. Hackers are looking for self-identified privileged users who broadcast on social media sites their career positions.

October 9, 2014
By Maryann Lawlor

When it comes to STEM, it is time to stop talking about the need and the gap and the possible solutions and start doing something about them. Action not only requires that more students and future teachers major in STEM fields but also that governments and the private sector put their money where their mouths are by providing financial support to these students.

November 1, 2014
By George I. Seffers
SPAWAR Systems Center Pacific personnel and sailors from Explosive Ordnance Disposal Mobile Unit ONE retrieve an unmanned underwater vehicle deployed to detect mines and improvised explosives in shallow water environments.

As the U.S. Navy modernizes information systems across the fleet, one organization is responsible for researching, developing and fielding the full range of technologies in the Asia-Pacific region, providing complete life cycle development and support for systems, from concept to fielded capability.

November 1, 2014
By Rita Boland

The Department of Homeland Security’s SAFETY Act is finding a new application as it may serve to protect against the potential for lawsuits arising from the National Institute of Standards and Technology Cybersecurity Framework. Lawyers are answering questions from clients about possible legal actions, and the department and institute are working together to ensure developers work with confidence.

November 1, 2014
By Sandra Jontz
The Defense Information Systems Agency command center at Fort Meade, Maryland, in 2013.

There are no do-overs when it comes to safeguarding the U.S. military’s sensitive data. With that key, concise and blunt notion in mind, defense leaders say they are taking a slow, methodical, multipronged approach as the Defense Information Systems Agency develops a cloud security model for the whole of the Defense Department.

October 6, 2014
By Ali Cybulski

(ISC)² is offering a series of tips to educate the public for National Cyber Security Awareness Month.

September 30, 2014

LongView International, Reston, Virginia, has been awarded a maximum $8,291,746 modification (P0006) exercising the first option period on a one-year base contract (HT0011-13-F-0039) with three one-year options for software design, development and testing to support emerging requirements in the Defense Medical Logistics Standard Support (DMLSS), DMLSS Customer Assistance Module and Joint Medical Asset Repository applications to meet information assurance and the establishment of new data exchanges/services.

September 30, 2014

SeKON Enterprises Incorporated, Herndon, Virginia, was awarded an $12,433,560 cost-plus-fixed-fee contract, with options, to provide engineering, cybersecurity and configuration management support services to the program executive officer, Defense Healthcare Management Systems. The total potential contract value, including the one-year base period and four one-year option periods, is $75,603,463.

September 23, 2014
By Rita Boland

The U.S. Army officially activated its Cyber Protection Brigade earlier this month, marking the first time the service has had such a unit. As the defensive operations enabled by the brigade ramp up, the Army now also has a cyber branch operating provisionally, which will change the way soldiers are assigned to cyber career fields.

September 23, 2014
By Chris LaPoint

Without quick problem resolution, information technology pros are very often the first to be blamed for slow application performance. A SolarWinds survey found that the lack of cross-silo visibility delays app problem resolution, hindering government information technology professionals from accomplishing their missions.

September 22, 2014
By Robert K. Ackerman
Rep. Mike Rogers (R-MI), chairman of the House Permanent Select Committee on Intelligence (l), and Rep. Dutch Ruppersberger (D-MD), ranking member of the committee, discuss intelligence oversight issues at the AFCEA/INSA Intelligence and National Security Summit 2014.

The U.S. intelligence community must innovate and expand its capabilities menu just as critics are calling for greater oversight on its operations.

September 22, 2014
By Robert K. Ackerman

The FBI is focusing on cyberspace both as a tool for crime detection and prevention and as a venue for operations.

September 22, 2014
By Robert K. Ackerman

New threats such as cyberterrorism complement traditional threats such as weapons of mass destruction among the defense intelligence capabilities underpinning future intelligence activities.

September 19, 2014
By Robert K. Ackerman

Other threats to the United States may make daily headlines, but space and cyberspace are below the public radar while at the top of many lists of concerns.

September 18, 2014
By Robert K. Ackerman

The Internet of Things offers the potential of a networking revolution. But, while the theory is sound, its realization must overcome many hurdles first.

September 18, 2014
By Robert K. Ackerman

The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.

September 18, 2014
By Robert K. Ackerman

Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.

September 17, 2014
By Rita Boland

The Department of Homeland Security is looking to roll out a new central biometric system in the next two to four years.

September 15, 2014

Technique Solutions Inc., Stafford, Virginia, was awarded a $25 million indefinite- delivery/indefinite-quantity, firm-fixed-price contract for the entire spectrum of equipment and services associated with the Cyber Network Defense mission and information assurance support. Funding and work location will be determined with each order, with a completion date of Sept. 14, 2019. Army Contracting Command, Key West, Florida, is the contracting activity (W912PX-14-D-0002).

September 15, 2014
By Maryann Lawlor

The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems.

Pages