Cyber Blog

Zero Trust Is Key Enabler of Air Force’s Agile Combat Employment

July 22, 2021
By Kimberly Underwood
U.S. Air Force airmen at Andersen Air Force Base, Guam, work to refuel an F-35A Lighting II aircraft assigned to Eielson Air Force Base, Alaska during the Cope North exercise in February. The airmen were conducting agile combat employment, or ACE, training during the exercise. The service’s ACE operations, which aim to bring more agility, resiliency and deterrence in a near-peer competitive environment, will be supported by its zero-trust architecture platforms. Credit: Pacific Air Forces/Senior Airmen Jona

The service’s move to send groups of multicapable airmen in an agile, dispersed manner from main operating bases will be supported by the emerging cybersecurity measure.

The Past Can Profit Cyber Planning

July 1, 2021
By Maryann Lawlor
Gen. Paul M. Nakasone, USA, tells Army National Guard soldiers U.S. Cyber Command is only as good as all the components, including Active, Reserve and National Guard. Photo by Steven Stover, 780th Military Intelligence Brigade

Battling terrorists resulted in knowledge to fight near-peer adversaries.

Security, AI Top List of Naval Network Integration

June 30, 2021
By George I. Seffers
Security and artificial intelligence enabled by cloud computing and DevSecOps are top capabilities needed for integrated networking for the U.S. naval forces, including the Navy, Marine Corps and Coast Guard. Credit: U.S. Coast Guard photo

Asked about the changes needed deliver the networking capability needed for a major conflict with a peer or near-peer adversary, experts agreed security is a top priority along with AI. 

Cyber May Call the Shots in the Next Conflict

June 29, 2021
By Robert K. Ackerman
An information systems technician troubleshoots the automated digital network system aboard the USS Theodore Roosevelt. Greater network integration is vital to prevent an adversary from pre-empting a kinetic operation by purely a cyber attack. Credit: MC2 Mar'Queon Tramble, USN

Cyber ultimately be the determining domain if a capable adversary achieves its combat goals before it even fires a kinetic shot.

Interoperability Key in Navy Fight Against Cyber Adversaries

June 23, 2021
By Robert K. Ackerman
Quality assurance specialists at the Naval Information Warfare Center Pacific inspect network racks in the center's Network Integration and Engineering Facility. The Navy is tasking industry with providing cybersecurity solutions that are interoperable across the service. (Credit: Rick Naystatt, U.S. Navy)

Future Navy cybersecurity tools must be interoperable if the fleet is to defend against oncoming threats.

Air Force Greatly Widens the Aperture on Zero Trust

June 22, 2021
By Kimberly Underwood

The service is aggressively going after the emerging cybersecurity method.

Sponsored: Comprehensive Cybersecurity for Maintaining Tactical and Strategic Naval Dominance

June 14, 2021
Credit: ZinetroN/Shutterstock

Current acquisition and infrastructure programs cannot keep pace with the threat environment.

New Cyber Training Unit Empowers Digital Defenders

June 15, 2021
By Kimberly Underwood
Senior Airman Thomas Goodnoe, USAF, tactical network operations technician, 1st Combat Communications Squadron (l), and Staff Sgt. Darryl Terry, USAF, cyber transport supervisor, 1st CBCS, review their systems against their technical guides during a cybersecurity audit in 2017 at Ramstein Air Base, Germany. The Air Force has added a new detachment that will provide initial training to cybersecurity airmen before they reach their mission locations. Credit: U.S. Air Force photo/Staff Sgt. Timothy Moore

Six-month old Air Force detachment takes the burden off of operational units for cyber training.

Cyber Hygiene Key to Protecting Networks in a Changing Online Environment

May 24, 2021
Cyber adversaries are creating a “wild west” environment in cyberspace where organizations must be aware of their security to protect themselves, said Gene Yoo, CEO of Resecurity Inc. Credit: Shutterstock

Combating cyber adversaries is a broad area requiring significant amounts of human intelligence and a deep technical expertise to identify them.

Shall the Children Lead in Cyberspace?

May 19, 2021
By Robert K. Ackerman
 Credit: metamorworks/Shutterstock

Starting cyberspace education early for children can benefit both their families and a profession starved for budding young experts.

Improving Identity Security and Management in a Cloud Environment

May 19, 2021
Cloud-based security architectures can help federal agencies protect their infrastructure and manage change as it occurs, says Sean Frazier, federal chief security officer at Okta Inc. Credit: Shutterstock

Government agencies can benefit from cloud-based security architectures.

People Power Army Cyber

May 18, 2021
By Robert K. Ackerman
Lt. Gen. Stephen G. Fogarty, USA, commander, U.S. Army Cyber Command, delivers the opening keynote in Episode Three of the TechNet Augusta Virtual Solutions Series.

It will be the human factor that determines the victor in the next Army cyber conflict.

Cyber Gunslingers Defend Key Military and National Assets

By Kimberly Underwood
The 67th Cyberspace Wing of the U.S. Air Force is examining the concept of software factory-as-a-service that could aid in cyber space operations, reports Wing Commander Col. Jeffrey Phillips, USAF.

Wing leader sees success in helping to digitally protect weapons and conduct cyber operations.

CISA: Do Not Pay Ransomware

May 13, 2021
By Kimberly Underwood
Making ransom payments in cyber attacks only fuels the business model of malicious actors, warns the acting director of the Cybersecurity and Infrastructure Security Agency, Brandon Wales, speaking to reporters on May 13.

Federal cybersecurity agency works to confront and protect against ransomware activity.

President Biden Issues Cybersecurity Executive Order

May 13, 2021
By Kimberly Underwood
The new cybersecurity executive order from the White House calls for the federal government’s increased use of multifactor authentication, encryption, endpoint detection response, breach logging, zero-trust architecture and cloud computing, according to a senior administration official. Credit: Shutterstock/Andrea Izzotti

Measure aims to address large-scale adversarial attacks to the government and critical infrastructure.

New Service Academy Proposal Puts Focus on Building Cyber Workforce

May 13, 2021
By Beverly Cooper
Credit: Shutterstock/insta_photos

A digital academy similar to service academies would enhance leadership and education in the cyber realm.

Taking the First Steps for Privileged Access Management

April 28, 2021
Getting privileged access management right involves making sure the right security tools are in place and determining that they are easy to use and can interoperate with legacy software and systems, says Ross Johnson, director of federal sales for Thycotic Software Ltd. Credit:Shutterstock

Assessing what’s on a network helps with security audits.

DISA and JFHQ-DODIN's Orchestrated Response to SolarWinds

April 20, 2021
By Kimberly Underwood
Leaders from the Defense Information Systems Agency and the Joint Force Headquarters Department of Defense Information Network, including Gen. Garret Yee, Gen. Paul Fredenburg and Joe Wassel, found that the close working relationship of the two organizations was crucial in responding to the SolarWinds malware attack.

The organizations relied on their 24/7 cyber operations, supply chain management and partnerships.

Trusting Zero Trust Architecture

April 20, 2021
Zero trust architecture isn’t a single architecture, nor is it a single solution that can be purchased, but an interrelated set of old and new technologies and methods working together, said Don Maclean, chief cybersecurity technologist for DLT Solutions.

Getting the cybersecurity method right is more complex than it seems.

Helping DOD Agencies Move to New Tech

April 19, 2021
Industry can help the DOD with complex technology acquisition and deployment projects by providing services and expertise, said Dana Barnes, senior vice president of public sector at Palo Alto Networks. Credit: Shutterstock

Industry partnerships aid acquiring, implementing next-generation systems.

Pages