Cyber

September 10, 2014
By George I. Seffers

The U.S. Army is building a Cyber Center of Excellence at Fort Gordon, Georgia, and it will not come cheap, warned Maj. Gen. Stephen Fogarty, USA, the center’s new commanding general.

September 10, 2014
By George I. Seffers

Former National Security Agency contractor Edward Snowden single-handedly shocked the U.S. intelligence community by leaking reams of information to the news media, but the insider threat is much more widespread, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia.

September 10, 2014
By George I. Seffers

The cyber era requires partnerships and information sharing across the agencies, industries and nations, said Maj. Gen. Stephen Fogarty, USA, the new commanding general, U.S. Army Cyber Center of Excellence, Fort Gordon, during a keynote address at the AFCEA TechNet 2014 Augusta conference, Augusta, Georgia.

September 9, 2014
By George I. Seffers

U.S. Army officials struggled during the AFCEA TechNet Augusta 2014 to discuss the future of cyber operations when much of that future is currently unknowable, in large part because no one knows the effects or challenges of emerging technologies.

September 9, 2014
By George I. Seffers

The U.S. Army may at some point need to allow soldiers to conduct offensive cyberwarfare at the brigade combat team level, according to a panel of chief warrant officers.

September 9, 2014
By Sandra Jontz

The U.S. Defense Department is primed to take a first step toward the realization of JIE as it gears up information migration to the joint regional security stacks, or JRSS, a key upgrade to streamline and secure network operations.

September 9, 2014
By George I. Seffers

The U.S. Army is standing up a cyber brigade and considering a cyber branch, which has some questioning the future of the services Signal Corps, but the Signal Corps will survive, Lt. Gen. Robert Ferrell, USA, the service’s chief information officer, said during a luncheon keynote speech at the AFCEA TechNet Augusta 2014 conference.

October 1, 2014
By Paul A. Strassmann

Budget cuts and rapidly improving information technology are forcing the U.S. Defense Department to confront increasing cybersecurity demands without commensurate increases in available resources

September 9, 2014
George I. Seffers

U.S. Army officials are laboring to define what the force will look like in 2025. But technologically speaking, it is hard to define anything beyond the next two or three years, according to Lt. Gen. Edward Cardon, USA, commanding general, Army Cyber Command.

September 9, 2014
George I. Seffers

Sometimes, cyber warriors will have to pick and choose what to protect, because, “It’s increasingly clear we can’t protect everything,” said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, while addressing the AFCEA TechNet Augusta audience.

September 9, 2014
George I. Seffers

All too often, the topic of cyber presents a negative view of vulnerabilities and attacks, but cyber has a positive role to play in national defense, said Lt. Gen. Edward Cardon, USA, commanding general, U.S. Army Cyber Command, speaking as a keynote at AFCEA TechNet Augusta.

October 1, 2014
By Rita Boland

As organizations migrate more data into public clouds, demands for a different type of security are emerging. A specialized option is available now for Amazon Web Services that aims to mitigate threats more quickly by finding them faster and suggesting methods of remediation.

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

August 28, 2014
By George I. Seffers

Revelations about the NSA's monitoring practices created some fallout with the telecommunications industry and other nations, acknowledges Adm. Michael Rogers, USN, the agency’s new director. But the capabilities the agency provides eclipse the damage done.

August 25, 2014
This article is written by our sponsor Riverbed Federal. - See more at: http://www.afcea.org/content/?q=node/13370#sthash.xU7eWo3D.dpuf

This article is written by our sponsor Riverbed Federal. Federal agencies are always looking for ways to spend their security dollars more efficiently. Cyber Attack Defenders recently sat down with Sean Applegate, director of technology strategy at Riverbed Federal, who provided some tips on how agencies can boost their security capabilities while cutting costs.

August 22, 2014
By Maryann Lawlor

The National Institute of Standards and Technology (NIST) is preparing recommendations to help organizations leverage the benefits of mobile apps while managing their risks.

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

September 1, 2014
By Sandra Jontz
A U.S. Marine experiments with Lighthouse software on a mobile device.

The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.

July 31, 2014
By Jessica Gulick

Partnerships are growing from disparate groups in search of the same goal.

August 1, 2014
By Robert K. Ackerman

The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford.

Pages