Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Event Coverage

Only Existing Technologies Allowed Into Future GIG

November 3, 2011
By Robert K. Ackerman

The Defense Department wants innovative solutions to build the third generation of the Global Information Grid (GIG 3.0), but it wants only current technologies to underpin those innovations.

Management Is Key for GIG 3.0

November 3, 2011
By Robert K. Ackerman

Accountability, in the form of identity and access management, will be the key elements in the Defense Department's third-generation Global Information Grid, or GIG 3.0.

New Capabilities, Same Old Issues Define Social Media

November 2, 2011
By Robert K. Ackerman

The problems that the military is facing as personnel make greater use of social media are the same that it has confronted with earlier communications technologies. And, the solution may be the same: greater education on, and adherence to, security guidelines.

Forget Firewalls, Focus on Understanding

November 2, 2011
By Robert K. Ackerman

Modern cybercriminals have become too sophisticated for traditional security measures. So, the old way of ensuring network security must give way to a new approach that encompasses the whole of user operations in the network.

New Technology and Usage Are Boon to Hackers

November 2, 2011
By Robert K. Ackerman

The spread of mobile networking systems along with the use of social media have opened new backdoors for hackers with potentially serious consequences, according to a leading security expert speaking at TechNet Asia-Pacific 2011. Tom Reilly, vice president and general manager, HP Enterprise Security, told the Wednesday breakfast audience that this major information technology transformation is leading to an escalation of attacks, especially against applications, and cyberspace will be a more dangerous place as a result. "Things are going to be much uglier in the cybercrime world," Reilly declared. He added that our adversaries are evolving away from traditional marauders. Many of them now are working at the behest of nation states. And, of course, they constantly are improving their sophistication. Ironically, while mobile computing has increased risk, the move to cloud computing may improve security. Reilly explained that the cloud provider would be responsible for security compliance, so individual users and groups would not be as much of a weak link in the security chain.

U.S. Needs to Be More Aggressive in Cyberspace

November 1, 2011
By Robert K. Ackerman

It's time for the United States to review its national policy and develop procedures for going after cyberspace intruders. This may be the only way to have an effect on persistent cyber attacks.

Embrace Change or Become Irrelevant

August 25, 2011
By Rita Boland

The chairman and CEO of Cisco told the LandWarNet audience that industry and govnment has to change its approach to technology as advancements come faster than ever. Mobility, in particular, rapidly is alterting the technical landscape.

Army Cyber 2020

August 25, 2011
By Rita Boland

Lt. Gen. Rhett Hernandez, USA, commanding general of U.S. Army Cyber Command/2nd Army, outlines the future of cyber in the Army.

The Enterprise and Its Effects

August 25, 2011
By Rita Boland

The director of DISA talked about the enterprise and the future of military operations.

Defense Department CIO Addresses LWN

August 24, 2011
By Rita Boland

Consolidation and standardization will be key facets of future network operations, according to Teri Takai, Defense Department CIO.

Pages

Subscribe to RSS - Event Coverage