Event Coverage

September 18, 2014
By Robert K. Ackerman

The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.

September 18, 2014
By Robert K. Ackerman

The U.S. intelligence community had a good read on the unfolding events in Ukraine and with ISIL in Syria and Iraq. However, even the community's prescience has its limits.

September 18, 2014
By Robert K. Ackerman

Snowden and Manning have done serious damage to U.S. intelligence capabilities, and adversaries are adjusting their activities in response.

September 18, 2014
By Robert K. Ackerman

Cyber intelligence sharing must change its nature as well as expand its reach.

September 18, 2014
By Robert K. Ackerman

Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.

September 18, 2014
By Robert K. Ackerman

Food, water, disease and energy increasingly are becoming disruptive to global security. Accordingly, they are moving up the intelligence priority list.

September 18, 2014
By Rita Boland

The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.

September 18, 2014
By Robert K. Ackerman

The first U.S. national intelligence strategy in five years is released exclusively in unclassified form.

September 18, 2014
By Robert K. Ackerman

Demands for "immaculate collection" of intelligence data are putting U.S. national security at risk.

September 17, 2014
By Rita Boland

Cyber is the prime concern of the intelligence community, and going forward, every identity problem is a cyber issue.

September 17, 2014
By Rita Boland

Strong credentials that people trust will unlock new government and private sector activities. That was the message this morning from Jeremy Grant, senior executive adviser, National Strategy for Trusted Identities in Cyberspace (NSTIC).

September 17, 2014
By Rita Boland

Confyrm, GSMA and MorphoTrust win contracts from NSTIC to secure identities better.

September 16, 2014
By Rita Boland

Frank Abagnale, whose now-famous criminal exploits during his early years led him to an adulthood protecting the public, explained today what concerns him in terms of security and why people, not technology, need to be the biggest concern.

September 16, 2014
By Rita Boland

Biometric identification moved past fingerprints long ago, and the range of modalities is helping the keepers of law and order make a big difference in several ways.

September 16, 2014
By Rita Boland

People often don’t know who has their information, how those groups are using it or even if it’s correct.

September 16, 2014
By Rita Boland

The FBI’s Next Generation Identification system went live last week, replacing the Integrated Automated Fingerprint Identification System and improving accuracy.

September 11, 2014
By George I. Seffers

The anniversary of 9/11 serves as a reminder of the importance of planning the national security future. In the years since, the country strengthened relationships among departments and agencies, as well as with coalition partners and allies. It also has implemented tactics, techniques, procedures and technologies for sharing information across government and with international partners.

September 11, 2014
By George I. Seffers

DISA had been identified as the Defense Department’s cloud broker, but that was rescinded just last week, reported Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff.

September 11, 2014
By George I. Seffers

Senior military leaders will try next week to hash out differences on the command and control (C2) of the Joint Information Enterprise, or JIE, said Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff, in remarks at AFCEA TechNet Augusta 2014.

September 11, 2014
By George I. Seffers

Many Army soldiers are receiving new vehicles and new tactical communications systems, but often those systems are so complex soldiers have difficulties setting up and taking down their tactical networks. The issue limits mobility on the battlefield because units hesitate to move knowing it can take hours to re-establish network communications, said Lt. Gen. Patrick Donahue, USA, the new deputy commanding general, U.S. Army Forces Command.

Pages