July 1, 2015
By Lt. Gen. Robert M. Shea, USMC (Ret.)

Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.

December 2, 2014
By Chris LaPoint

Two years ago, the Defense Department developed the Joint Information Environment framework. Since then, key stakeholders and drivers have worked to realign, restructure and modernize the department’s information technology networks to increase collaboration while reducing the cyberthreat landscape.

March 12, 2012
By Beverly Schaeffer

No longer just the work of a one-man band playing hacker, cyber attacks launched either by state or non-state actors are a grim reality; one that is being addressed by the global cybersecurity exercise Cyber Storm 2012.

October 6, 2010
By H. Mosher

This month, Linton Wells II drew his inspiration for Mission Assurance Moves to the Fore in Cyberspace from Deputy Secretary of Defense William J. Lynn III's recently published article, Defending a New Domain: The Pentagon's Cyberstrategy. Wells summarizes Lynn's strategy points, noting that taken on a whole they have a broader implication than just cyberdefense. It has more to do with mission assurance, he says. But he has a number of concerns, among them: how will the new cyberstrategy be implemented? And how can the private sector do a better job of meeting its requirements?

August 27, 2010
By Beverly Schaeffer

NACMAST aims to broaden the view of the cyberwarfare intelligence base, and Seminole is one solid outcome of these efforts. Read the full article to learn more about this testbed and Seminole's components and operation. Share your views on this IDS architecture's current status and its potential for future success.