Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Cyberspace

U.S. Air Force Awards $249 Million Cyberspace Command and Control Contract

December 21, 2012
George I. Seffers

 
Intelligent Software Solutions, Colorado Springs, Colo.; BAE Systems, McLean, Va.; Charles River Analytics Inc., Cambridge, Mass.; Northrop Grumman Systems Corp., Herndon, Va.; Science Applications International Corp., McLean, Va.; Lockheed Martin Corp., Colorado Springs, Colo., and Solers Inc., Arlington, Va., are being awarded a $249 million multiple-award indefinite delivery/indefinite quantity for the development of command and control applications and information services for air, space and cyberspace domains. The contracting activity is the U.S. Air Force Life Cycle Management Center, Hanscom Air Force Base, Mass. 

5 New Year's Cyber Resolutions for Federal Agencies

December 21, 2011
By Dan Barber

From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are 5 resolutions federal agencies should make.

Information Leaks Can Sink Agencies

December 2, 2011
By Prenston Gale

Thousands of data breaches occur as a result of internal information leakage rather than an outside attack. There is a critical need to further educate government personnel on how to keep sensitive information secure. Guest blogger Prenston Gale weighs in with insight on how to achieve this important goal.

The Dominant Realm of This Century Will Be Virtual

November 3, 2011
By Robert K. Ackerman

Airpower dominated the 20th century, but cyberpower will dominate the 21st century. Change is outstripping conventional patterns as technologies race capabilities.

Military-Style Network Measures Needed to Secure Infrastructure

November 3, 2011
By Robert K. Ackerman

Network situational awareness, largely the purview of military systems, may be the best line of defense against cybermarauders threaten the nation's critical infrastructure.

Success Breeds Menace in Critical Infrastructure

November 3, 2011
By Robert K. Ackerman

The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.

Only Existing Technologies Allowed Into Future GIG

November 3, 2011
By Robert K. Ackerman

The Defense Department wants innovative solutions to build the third generation of the Global Information Grid (GIG 3.0), but it wants only current technologies to underpin those innovations.

Management Is Key for GIG 3.0

November 3, 2011
By Robert K. Ackerman

Accountability, in the form of identity and access management, will be the key elements in the Defense Department's third-generation Global Information Grid, or GIG 3.0.

New Capabilities, Same Old Issues Define Social Media

November 2, 2011
By Robert K. Ackerman

The problems that the military is facing as personnel make greater use of social media are the same that it has confronted with earlier communications technologies. And, the solution may be the same: greater education on, and adherence to, security guidelines.

Forget Firewalls, Focus on Understanding

November 2, 2011
By Robert K. Ackerman

Modern cybercriminals have become too sophisticated for traditional security measures. So, the old way of ensuring network security must give way to a new approach that encompasses the whole of user operations in the network.

Pages

Subscribe to RSS - Cyberspace