Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cyberspace

Military Changes On Tap for Ally Across the Pond

September 28, 2010
By Beverly Schaeffer

The United Kingdom plans to undertake the monumental task of restructuring its defense forces, equipping them to face current and future challenges more effectively. Do its plans thus far adequately address the major threats? Or, has it failed to focus more on specific contingencies? Share you ideas and suggestions here.

Finding Needles in the Cyberspace Haystack

August 27, 2010
By Beverly Schaeffer

NACMAST aims to broaden the view of the cyberwarfare intelligence base, and Seminole is one solid outcome of these efforts. Read the full article to learn more about this testbed and Seminole's components and operation. Share your views on this IDS architecture's current status and its potential for future success.

How to Improve Cyberdefenses at the DoD

August 23, 2010
By Paul Strassmann

A different cybersecurity culture needs to be diffused throughout the Defense Department. It will have to view cyberdefenses not as a bandage to be selectively applied to a patchwork of applications. The new cybersecurity must become an inseparable feature of every computer technology that enables our operations.

Cyberdefense and DoD Culture

August 23, 2010
By Paul Strassmann

Defense Department leadership appears to be viewing cyberdefense issues primarily as a matter of policy and strategy that can be fixed incrementally. That is not possible. Cyberdefense deficiencies have became deeply rooted as result of the defective ways in which the Defense Department acquired IT over the past decades. Cyberdefense flaws are inherently enterprise-wide and are mostly not application specific.

Competition Offers Teens Insight into Cyberdefense

August 18, 2010
By Rachel Eisenhower

The nation's largest, simultaneous high school cybersecurity competition is back, and students across the nation have until October 8 to sign up. Winners will walk away from CyberPatriot III with scholarships and the knowledge of how to defend computer networks against real-life threats.

Guest Post: Network Virtualization

June 9, 2010
By Paul Strassmann

Paul Strassmann offers his insights on network virtualization as an answer to cyber security concerns about the proliferation of things contributing to the "attack surface," such as networks, circuits and computers.

Security and Accreditation Concerns Drive Discussion

May 19, 2010

Accreditation and certification of software is a vital, but time consuming process. On Tuesday afternoon, panelists at the AFCEA SOLUTIONS symposium discussed the challenge and ongoing attempts to streamline the process.

General Highlights Joint Staff C4 Priorities

May 18, 2010

"At the end of the day, it's about the warfighter."--Lt. Gen. Dennis Vis, USA, director, C4 systems, Joint Staff

Computing Rules Change, Security Concerns Still Remain

May 7, 2010
By Beverly Schaeffer

Security is the lifeblood of Defense Department operations, and the department is making strides to improve connectivity and to keep pace with technology. But can such a far-reaching organization relax its protocol even slightly and still trust that rules will be followed? Will the people involved buy in to the new culture and make it work? Tell us your thoughts, give us your suggestions.

United We Stand-Divided: Cyber Free Fall?

March 9, 2010
By Beverly Schaeffer

The U.S. cyber infrastructure receives double protection with help from the DHS' new cybersecurity integration center. Do you believe the NCCIC is equipped to handle and accomplish its mission? Can any single organization be? Will layers of bureaucracy hinder its effectiveness?

Pages

Subscribe to RSS - Cyberspace