Cyber

June 23, 2014
By Rita Boland

Companies Deep-Secure and Sweetwater s.r.l. signed a contract earlier this month that will extend cybersecurity measures in the Romanian market. The move should help address common cybercrime issues prevalent in former Eastern Bloc nations.

July 1, 2014
By Kent R. Schneider

Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.

June 11, 2014
By Rita Boland

The National Institute of Standards and Technology has revised its "Guidelines on Mobile Device Forensics." Released seven years after the original guidance came out, the changes recognize the advances in technology during that time frame.

June 10, 2014
By George I. Seffers

Scientists at the U.S. Army's Research Laboratory have successfully demonstrated information teleportation capabilities in the laboratory using entangled photons.

June 3, 2014
By Sandra Jontz

In the two-year Cyber Grand Challenge, 35 teams will vie for a $2 million grand prize and the honor of trying to devise a fully automated system to defend against cyber attacks.

May 27, 2014
By Beverly Mowery Cooper

Not only is the cost of cyber intrusion severe, the likelihood of it occurring is assured. Cybersecurity defenses must be flexible, innovative and persistent to address an ever-changing threat.

May 20, 2014
By George I. Seffers

Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase.

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.

May 14, 2014
By Robert K. Ackerman

A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.

May 13, 2014
By Robert K. Ackerman

The U.S. Special Operations Command is taking an unconventional approach to equipping its forces for an information environment that does not follow conventional guidelines. The command must provide networking for a theater force that can range from one person up through thousands of people, and it faces diverse mission needs that can require large communications pipes.

May 13, 2014
By Robert K. Ackerman

The Defense Logistics Agency is charging full speed into an infocentric environment that will include mobile technologies, changing the way the agency operates. Part of this effort includes the agency’s own version of the Joint Information Environment, which will help improve interoperability.

May 13, 2014
By Robert K. Ackerman

The U.S. Transportation Command moves more information than it does any physical commodity, and this development has redefined the command's security requirements. These requirements are complicated by the presence of commercial providers whose presence poses potential cyberspace vulnerabilities.

May 13, 2014
By Robert K. Ackerman

Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials said during AFCEA’s JIE Mission Partner Symposium.

May 13, 2014
By Robert K. Ackerman

The battle against cybermarauders begins with individual home computers, said Rear Adm. Hank Bond, USN, J-6, U.S. Northern Command (NORTHCOM), and deputy J-3 for cyberspace operations at NORAD, during a panel presentation on the second day of AFCEA's three-day JIE Mission Partner Symposium.

May 12, 2014
By Robert K. Ackerman

The architecture of the Joint Information Environment (JIE) will help the Defense Department deal with the growing insider threat, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA). He told the audience at AFCEA’s three-day Joint Information Environment Mission Partner Symposium that the move to the cloud will enable better security and prevent the traditional insider threat from menacing valuable data.

May 12, 2014
By Robert K. Ackerman

The Defense Information Systems Agency (DISA) is changing its own internal methods of operation to reflect the direction it is giving the services in the move toward the Joint Information Environment, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, at the Joint Information Environment Mission Partner Symposium.

May 12, 2014
By Robert K. Ackerman

The defense community must move away from email and fully into social media, says the director of the Defense Information System Agency (DISA). Lt. Gen. Ronnie D. Hawkins Jr., USAF, told the audience at AFCEA’s Joint Information Environment Mission Partner Symposium that the defense community must break with the past in digital information technology.

June 1, 2014
By Robert K. Ackerman
A Pleiades satellite image clearly shows buildings, including Olympic venues, in Sochi, Russia. The National Geospatial-Intelligence Agency is employing its own intelligence products to help personnel from other intelligence organizations locate and identify structures worldwide that might be the source of hostile cyber activity.

The borderless world of cybersecurity now is benefitting from geospatial intelligence products. The U.S. National Geospatial-Intelligence Agency has joined the fight against cybermarauders by providing imagery to help cyberwarriors track down online adversaries. Experts defending the United States from cyber attack abroad have a new tool in their kit by being able to see the facility from which digital malefactors are plying their wares.

June 1, 2014
By Rita Boland
Virginia National Guard soldiers from the Fairfax-based Data Processing Unit respond to a simulated cyber attack during a cyberdefense exercise.

Cybersecurity remains a priority for the U.S. Defense Department, with officials protecting resources for it in the face of overall budget constraints. Guidance from the National Defense Authorization Act for Fiscal Year 2014 directs a mission analysis of cybercapabilities not only in the active military, but also across partners, to help forces maintain their edge in protecting the nation.

Pages