Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Event Coverage

Military-Style Network Measures Needed to Secure Infrastructure

November 3, 2011
By Robert K. Ackerman

Network situational awareness, largely the purview of military systems, may be the best line of defense against cybermarauders threaten the nation's critical infrastructure.

Success Breeds Menace in Critical Infrastructure

November 3, 2011
By Robert K. Ackerman

The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.

The Coast Guard Wants UAVs

November 3, 2011
By Robert K. Ackerman

The U.S. Coast Guard is looking at a variety of options for adding maritime versions of unmanned air vehicles (UAVs) to its sea assets. These vehicles would be used to maintain persistent presence in remote ocean areas.

Only Existing Technologies Allowed Into Future GIG

November 3, 2011
By Robert K. Ackerman

The Defense Department wants innovative solutions to build the third generation of the Global Information Grid (GIG 3.0), but it wants only current technologies to underpin those innovations.

Management Is Key for GIG 3.0

November 3, 2011
By Robert K. Ackerman

Accountability, in the form of identity and access management, will be the key elements in the Defense Department's third-generation Global Information Grid, or GIG 3.0.

New Capabilities, Same Old Issues Define Social Media

November 2, 2011
By Robert K. Ackerman

The problems that the military is facing as personnel make greater use of social media are the same that it has confronted with earlier communications technologies. And, the solution may be the same: greater education on, and adherence to, security guidelines.

Forget Firewalls, Focus on Understanding

November 2, 2011
By Robert K. Ackerman

Modern cybercriminals have become too sophisticated for traditional security measures. So, the old way of ensuring network security must give way to a new approach that encompasses the whole of user operations in the network.

New Technology and Usage Are Boon to Hackers

November 2, 2011
By Robert K. Ackerman

The spread of mobile networking systems along with the use of social media have opened new backdoors for hackers with potentially serious consequences, according to a leading security expert speaking at TechNet Asia-Pacific 2011. Tom Reilly, vice president and general manager, HP Enterprise Security, told the Wednesday breakfast audience that this major information technology transformation is leading to an escalation of attacks, especially against applications, and cyberspace will be a more dangerous place as a result. "Things are going to be much uglier in the cybercrime world," Reilly declared. He added that our adversaries are evolving away from traditional marauders. Many of them now are working at the behest of nation states. And, of course, they constantly are improving their sophistication. Ironically, while mobile computing has increased risk, the move to cloud computing may improve security. Reilly explained that the cloud provider would be responsible for security compliance, so individual users and groups would not be as much of a weak link in the security chain.

U.S. Needs to Be More Aggressive in Cyberspace

November 1, 2011
By Robert K. Ackerman

It's time for the United States to review its national policy and develop procedures for going after cyberspace intruders. This may be the only way to have an effect on persistent cyber attacks.

Embrace Change or Become Irrelevant

August 25, 2011
By Rita Boland

The chairman and CEO of Cisco told the LandWarNet audience that industry and govnment has to change its approach to technology as advancements come faster than ever. Mobility, in particular, rapidly is alterting the technical landscape.

Pages

Subscribe to RSS - Event Coverage