Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even though they are not the intended targets, according to a leading security expert.
A “digital Pearl Harbor Armageddon” that inflicts catastrophic damage on the United States is not likely soon or in the foreseeable future. The worst cyber attack that could be expected would have less of an effect for a shorter period of time, said an expert with the Office of the Director of National Intelligence (ODNI).
Industry officials foresee changes in network security.
Cyber industry experts predict a number of coming developments in the cyber realm, driven in part by government strategy and funding uncertainties. The future may include a greater reliance on law enforcement to solve state-sponsored hacks, increased automation and more outsourcing.
In the midst of a raging controversy over widespread National Security Agency (NSA) monitoring, the head of the NSA and U.S. Cyber Command defends cyber surveillance efforts and calls for greater consolidation of cyber activities among diverse organizations.
Concerns about the telecommunications supply chain have led U.S. network providers to institute extensive security procedures, but government officials are looking at establishing formal guidelines for procuring network components overseas—for better or worse.
Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.
Industry and government search for for the best approach for the rapid recovery of a key element of the electrical grid in the event of an attack.
It’s time for military leaders, and yes, even members of the intelligence community, to come out from behind the curtain. They not only need to share with the public what networks and radios and tanks and guns mean to a warfighter’s safety but also what they mean to global security.
The synergy between operational planning and radar sensing provides enhanced search and rescue capabilities.
The U.S. Coast Guard is combining high-frequency coastal radar data with traditional oceanographic and geographic information to improve its chances of rescuing people in distress on the high seas. By merging these different sources of data, the Coast Guard enhances its search abilities while also providing better weather prediction for both its search and rescue teams and an endangered public in coastal areas.
Cobham’s Brazilian subsidiary has secured its first major contract in Brazil to equip state police helicopters with high definition video surveillance downlinks, which will be used on helicopters in 12 cities during the 2013 Confederations Cup and the 2014 World Cup. The contract was developed with a local integration partner following the opening of the Cobham’s Sao Paulo office in August 2012 and includes both airborne and ground based equipment.
The Regional Information Sharing Systems (RISS) Program recently implemented a simplified sign-on capability that enables federal, state and local law enforcement to collaborate.
To help government and industry connect, network and learn about requirements and solutions, SIGNAL Media offers Event eNews websites for several major AFCEA International events that feature near real-time coverage as well as daily wrap-ups of speakers and panel discussions.
To help keep global security professionals abreast of business opportunities and changes in the government acquisition landscape, AFCEA International has gathered information about these topics in a new section of the AFCEA website. Called AFCEA Corporate Member Resources, the page features new content about military and government organizations as it becomes available.
Ishpi Information Technologies Inc., Mount Pleasant, S.C., has won a $6.7 million dollar multi-year task to provide the United States Coast Guard with subject matter expertise in the areas of information systems security and analysis, certification and accreditation, risk management, and information assurance training support to the Command, Control, Communications, Computers, and Information Technology Service Center.
Homeland Security Conference 2013 Show Daily, Day 3
Although many in government are moving as quickly as possible to adopt new technologies, such as cloud computing and mobile devices, individual agencies still face cultural challenges that sometimes prevent them from moving forward, according to officials speaking as part of the Chief Information Officer Council at the AFCEA Homeland Security conference in Washington, D.C.
A cloud project takes advantage of emerging concepts to protect energy against disruptive threats.
When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor
The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.
Anyone who has attended an AFCEA conference in the past two months has heard the constant drumbeat from senior government leadership on the limitations on operations and readiness likely to occur in defense, intelligence and homeland security. At the AFCEA/USNI West 2013 Conference in San Diego January 29-31, the vice chairman of the Joint Chiefs of Staff told a packed audience that the U.S. Defense Department did not know how much money it would receive, when it would receive it or what the restrictions on its use would be.
As the U.S. government wrestles with its myriad budgetary woes, training, modeling and simulation can provide substantial savings in a variety of ways, according to officials speaking on the Training, Modeling and Simulation panel at the AFCEA Homeland Security Conference in Washington, D.C.
Top information technology officials from a variety of government agencies identified cloud computing, mobile devices and edge technologies as the technologies that will be critical for accomplishing their missions in the future.