Companies Deep-Secure and Sweetwater s.r.l. signed a contract earlier this month that will extend cybersecurity measures in the Romanian market. The move should help address common cybercrime issues prevalent in former Eastern Bloc nations.
Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.
The National Institute of Standards and Technology has revised its "Guidelines on Mobile Device Forensics." Released seven years after the original guidance came out, the changes recognize the advances in technology during that time frame.
Scientists at the U.S. Army's Research Laboratory have successfully demonstrated information teleportation capabilities in the laboratory using entangled photons.
In the two-year Cyber Grand Challenge, 35 teams will vie for a $2 million grand prize and the honor of trying to devise a fully automated system to defend against cyber attacks.
Not only is the cost of cyber intrusion severe, the likelihood of it occurring is assured. Cybersecurity defenses must be flexible, innovative and persistent to address an ever-changing threat.
Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase.
The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.
The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.
A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.
The U.S. Special Operations Command is taking an unconventional approach to equipping its forces for an information environment that does not follow conventional guidelines. The command must provide networking for a theater force that can range from one person up through thousands of people, and it faces diverse mission needs that can require large communications pipes.
The Defense Logistics Agency is charging full speed into an infocentric environment that will include mobile technologies, changing the way the agency operates. Part of this effort includes the agency’s own version of the Joint Information Environment, which will help improve interoperability.
The U.S. Transportation Command moves more information than it does any physical commodity, and this development has redefined the command's security requirements. These requirements are complicated by the presence of commercial providers whose presence poses potential cyberspace vulnerabilities.
Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials said during AFCEA’s JIE Mission Partner Symposium.
The battle against cybermarauders begins with individual home computers, said Rear Adm. Hank Bond, USN, J-6, U.S. Northern Command (NORTHCOM), and deputy J-3 for cyberspace operations at NORAD, during a panel presentation on the second day of AFCEA's three-day JIE Mission Partner Symposium.
The architecture of the Joint Information Environment (JIE) will help the Defense Department deal with the growing insider threat, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA). He told the audience at AFCEA’s three-day Joint Information Environment Mission Partner Symposium that the move to the cloud will enable better security and prevent the traditional insider threat from menacing valuable data.
The Defense Information Systems Agency (DISA) is changing its own internal methods of operation to reflect the direction it is giving the services in the move toward the Joint Information Environment, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, at the Joint Information Environment Mission Partner Symposium.
The defense community must move away from email and fully into social media, says the director of the Defense Information System Agency (DISA). Lt. Gen. Ronnie D. Hawkins Jr., USAF, told the audience at AFCEA’s Joint Information Environment Mission Partner Symposium that the defense community must break with the past in digital information technology.
The borderless world of cybersecurity now is benefitting from geospatial intelligence products. The U.S. National Geospatial-Intelligence Agency has joined the fight against cybermarauders by providing imagery to help cyberwarriors track down online adversaries. Experts defending the United States from cyber attack abroad have a new tool in their kit by being able to see the facility from which digital malefactors are plying their wares.
Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.