Cyber Blog

Technology Underpins Indo-Pacific Command Intelligence

November 15, 2018
By Robert K. Ackerman
Australian Army Brig. Colin Karotam, assigned to the U.S. Indo-Pacific Command, leads a panel exploring how technology will help meet the challenges of the vast region. Credit: Bob Goodwin Photography

Being able to conduct successful operations in the Indo-Pacific region will require top-notch intelligence, and information technologies hold the key to achieving that goal.

Many Shortcomings Plague Cybersecurity

November 14, 2018
By Robert K. Ackerman
Vice Adm. Nancy Norton, USN, director, DISA, and commander, JFHQ-DODIN, describes cybersecurity challenges at a TechNet Asia-Pacific panel.

The U.S. needs to take a multifaceted approach to cybersecurity to ameliorate problems affecting every sector of government and society.

Cyber Assumes New Role in U.S. Indo-Pacific Command

November 14, 2018
By Robert K. Ackerman
Adm. Philip S. Davidson, USN, commander of the U.S. Indo-Pacific Command, describes the command's new cyber challenges and policy at TechNet Asia Pacific 2018 in Honolulu.

The U.S. Indo-Pacific Command is seeking the capabilities and enabling technologies to conduct “full-spectrum cyber operations” in its vast region of responsibility.

DOD Poised to Help DHS Secure Elections

October 20, 2018
By George I. Seffers
Credit: daniel_diaz_bardillo/Pixabay

Under a new memorandum of understanding with DHS, the U.S. Defense Department will step up efforts to share information for critical infrastructure protection.

The Plausibility of Forecasting Cyber Attacks

October 30, 2018
By Kimberly Underwood
Experts at MILCOM consider the possibility of forecasting cyber attacks. Credit: Katie Helwig

Experts examine if and how cyber attacks can be predicted.

GAO: U.S. Weapon Systems Easily Hacked

October 9, 2018
By George I. Seffers
With stealth technology, advanced sensors, weapons capacity and range, the F-35 can collect, analyze and share data. A U.S. Government Accountability Office report—which did not specify any particular weapon system—says a number of cybersecurity tests prove U.S. military weapon systems to be vulnerable to cyber attacks. Photo: Lockheed Martin

One cybersecurity test team reported that it caused a pop-up message to appear on terminals, instructing users to insert two quarters to continue operating.

Speed of Cyber Is Not Always in Milliseconds

October 1, 2018
By George I. Seffers
Soldiers from the 25th Infantry Division in Hawaii and from U.S. Army Training and Doctrine Command Centers of Excellence participate in the Army's Cyber Blitz in April 2016 at Joint Base McGuire-Dix-Lakehurst, New Jersey. Cyber Blitz provides the Army a way to learn about cyber and electromagnetic activity. U.S. Army CERDEC photo by Kristen Kushiyama

Among the lessons learned from the U.S. Army’s Cyber Blitz: Cyber operations do not always occur in fractions of seconds.

Combating Synthetic Identity Fraud

September 27, 2018
By Shaun Waterman
Credit: Shutterstock/Blazej Lyjak

The growth in a new kind of identity theft highlights the need for the federal government to step up and help the private sector verify citizens’ identity.

DOD, White House Release Cybersecurity Strategies

September 27, 2018
Posted by Kimberly Underwood
President Donald Trump departs from the South Lawn of the White House on September 6.  With the issuance of the new National Cyber Strategy, the president promises his administration "will act to further enable the Department of Homeland Security (DHS) to secure federal department and agency networks.” Credit: Shealah Craighead

Both strategies recognize the vital nature of necessary American action in cyberspace to defend its interests.

The U.S. Government Urgently Needs to Address Cybersecurity Challenges

September 24, 2018
Posted by Kimberly Underwood
A recent report from the U.S. Government Accountability Office (GAO) finds federal government actions related to cybersecurity lagging, posing a threat to the nation’s critical infrastructure and federal agencies. Photo credit: Shutterstock/Mark Van Scyoc

Despite the high risks, the federal government has failed to implement certain cybersecurity actions, GAO reports.

Army Leads Other Services in Cyber Realm

August 22, 2018
By George I. Seffers
Fort Gordon, Georgia, is home to the Army Cyber Command and the Army Cyber Center of Excellence. U.S. Army photo

“The Army is the example that I hold up to my fellow sailors. The Army is doing it exactly right,” Rear Adm. William "Bill" Leigher, USN (Ret.). 

Taking the Cyber Out of Cyber Command

August 21, 2018
By George I. Seffers
Lt. Gen. Stephen Fogarty, USA, commanding general, U.S. Cyber Command, speaks at AFCEA’s TechNet Augusta conference. Photo by Michael Carpenter

Lt. Gen. Stephen Fogarty, U.S. Army Cyber Command, recommends his command and U.S. Cyber Command change their names to reflect the full range of information operation capabilities.

Key Cyber Provisions of the NDAA

August 14, 2018
By Kimberly Underwood
Soldiers from the 10th Mountain Division (LI) perform an air assault demonstration for President Trump during a visit to Fort Drum, New York, on August 13. The demonstration was part of the President’s ceremony to sign the National Defense Authorization Act of 2019, which authorizes funding for U.S. defense and military activities for Fiscal Year 2019. Photo credit: U.S. Army photo by Sgt. Thomas Scaggs.

Congress’ NDAA for Fiscal Year 2019 takes cybersecurity a step further, with language affirming DOD’s role in defending against attacks and operating in cyberspace.

Shark Tank Champion Caps Shark Week

July 30, 2018
By Robert K. Ackerman
Tom Miller, CEO of Clearforce, gives the winning presentation at the shark tank concluded at AFCEA’s Small Business Innovation Summit held July 26. Photography: Elizabeth Moon

The small business winner is a Virginia firm that uncovers internal security threats before they can bite their employers.

Speed Drives Navy Cyber Actions

July 26, 2018
By Robert K. Ackerman
Rear Adm. Danelle Barrett, USN, director, Navy Cybersecurity Division, Office of the Chief of Naval Operations, spoke at the AFCEA Small Business Innovation Summit on July 26.

The U.S. Navy is racing against time as well as both internal and external challenges to modernize its cyber operations.

Picosegmentation Prevails in Shark Tank

July 16, 2018
By Robert K. Ackerman
Joining Michael Hodge, vice president, Federal, Avocado Systems (2nd from r) are the three July 11 Shark Tank judges (l-r) Dan Wolley, founder and managing partner, Ponderosa Management Group; Maria Horton, CEO, EmeSec; and Christina Monaco, chief ventures officer, National Geospatial Intelligence Agency. Photo by Elizabeth Moon

The third and final competitor in the AFCEA Small Business Innovation Summit Shark Tank is a firm that provides advanced data security at a small level.

Living in a Post-Truth World

May 23, 2018
By Julianne Simpson
“Russia is not a resurgent power. Russia is a remonstrate power,” said Gen. Michael Hayden, USAF (Ret.), principal, the Chertoff Group, during his morning keynote at the AFCEA/GMU Critical Issues in C4I Symposium.

The United States must combat the Russian information machine.

Creating Situational Awareness with Analytics

May 22, 2018
By Julianne Simpson
During her morning keynote, Stempfley stressed the importance of using analytics to create situational awareness in cybersecurity.

Situational awareness is key to cybersecurity and using analytics can help create the situational awareness needed to defend the nation from adversaries.

Machine Learning Advances Can Strengthen Cyber Defense

May 17, 2018
by Kimberly Underwood
Mark Russinovich, chief technology officer, Microsoft Azure, discusses machine learning at the AFCEA Defensive Cyber Operations Symposium.

Machine learning has advanced to the point where sophisticated methods can be more effective at cyber event detection than traditional methods.

Refining STEM Education to Raise the Bar for Cyber

May 16, 2018
By Kaitlyn Cotter
Panelists discuss STEM education and training cyber warfighters during a panel at the Defensive Cyber Operations Symposium.

From Head Start programs to internships and mentoring, panelists agree preparing the next generation of cyber warfighters comes down to facilitating opportunity.

Pages