Cyber Blog

Lax Cybersecurity Threatens Missions

September 25, 2020
By Maryann Lawlor
Enterprisewide Risk Management (ERM) consists of the formal identification of major risks to the organization’s mission.

Cybersecurity is now a significant area of focus to senior leaders who have witnessed significant financial and reputational damage from adversaries.

DISA Readies Zero Trust Architecture for Warfighters

September 21, 2020
By Kimberly Underwood
The Defense Information Systems Agency is finishing its zero trust architecture to bring advances in security and data availability to warfighters. Credit: DISA

The Defense Information Systems Agency’s efforts will improve cybersecurity across the Defense Department.

The Interdependency of Identity Management and Zero Trust Architecture

September 11, 2020
By Kimberly Underwood
Once more of an operational and end-user experience tool, identity management has evolved to be a core aspect of cybersecurity, especially as part of zero trust architecture, say panelists Wednesday at the FedID conference.

Together, advanced security and identification verification methods can greatly elevate cyber security posture, experts say.

The Accuracy of Machines in Facial Recognition

September 9, 2020
By Kimberly Underwood
Credit: Shutterstock/MONOPOLY919

Researchers studying human-versus-machine facial recognition abilities over the long term come up with interesting results.

Rapid AI Development Demands Reform

September 4, 2020
By Robert K. Ackerman
The U.S. Government Accountability Office (GAO) is exploring the ramifications of a number of emerging disruptive technologies. Credit: GAO file photo

The pervasiveness of cyber requires the federal government to delve into regulatory issues, privacy concerns, economic competitiveness and security requirements.

Five Eyes Nations Release Cybersecurity Principles

September 1, 2020
Posted by Kimberly Underwood
The Five Eyes nations, including Australia, Canada, New Zealand, the United Kingdom and the United States, conducted extensive joint research on cyber breeches, culminating in an incident response playbook for the extended community of partners and network administrators. Credit: Shutterstock/Metamorworks

The joint advisory offers technical approaches to finding malicious activity on digital networks.

U.S. Army Conducts Final Cyber Blitz

August 24, 2020
By George I. Seffers
In recent years, the Army's Cyber Blitz experiment evolved well beyond just cyber, allowing the service to define the integration of cyberspace, electronic warfare, intelligence, space and information operations. Beginning next year, the experiment will be known as Multi-Domain Operations Live. Photo by Spc. Marcus Gresham, USA

The Cyber Blitz experiment has evolved into a multidomain operations exercise that beginning next year will be named Multi-Domain Operations Live.

If You Want to Support Warfighters, DISA Needs You

August 19, 2020
By George I. Seffers
Lori Ramirez, DISA’s director, workforce services and development, discusses the agency's efforts to recruit talented personnel by using virtual meeting and information sharing tools during the pandemic and beyond.

Virtual meeting tools help DISA reach more people and build stronger relationships with potential employees. 

Putting Cyber Software First

August 19, 2020
By Kimberly Underwood
Speaking at a virtual luncheon of AFCEA's Alamo Chapter on August 19, Lt. Col. John Priestly, USAF, program director and material leader, Unified Platform Program; and director, LevelUp CodeWorks Software Factory, San Antonio, shares that he is seeing initial success at the cyber software factory, which is less than a year old.

The Air Force software factory LevelUp Code Works aims for rapid development and delivery of cyber solutions.

Industrial Base Requires Hyper Cyber Vigilance

August 10, 2020
By Maryann Lawlor
Ransomware attacks affect computers by encrypting all of the information on the device. The hackers then demand a ransom, usually paid in the form of crypto currency in return for the decryption key. U.S. Air Force Graphic by Adam Butterick

Significant questions about systems security exist, and the U.S. industrial base may not be able to address all of the challenges effectively.

COVID-19 Raises Resilience Red Flags

July 31, 2020
By Maryann Lawlor
Military and government leaders share their insights about cybersecurity challenges in the age of pandemics.

Technology experts discuss lessons the infection teaches about cybersecurity and resilience.

DISA Changes its Course Mid-Pandemic

July 17, 2020
By Robert K. Ackerman
Carlen Capenos, director, Office of Small Business Programs at DISA, participates in a virtual event. DISA moved quickly into telework based on ongoing operations and preparations already in place when the pandemic struck. Credit: DISA

DISA was ready when telework became the new normal. Now, many of its pandemic-related measures are going to remain long after the virus has passed into memory.

DOD to Offer Zero Trust Architecture This Year

July 15, 2020
By George I. Seffers
U.S. Defense Department officials intend to complete an initial zero trust architecture by year's end to improve cybersecurity, according to Vice Adm. Nancy Norton, USN, director, Defense Information Systems Agency.

Defense Department officials are developing an initial reference architecture for zero trust security.

LTG Fogarty Stresses Command-Centric NetOps

July 14, 2020
By George I. Seffers
The U.S. Army's concept of command-centric network operations gives commanders greater authority and responsibility for network operations and relies on big data to enable faster, more effective decision making. U.S. Army photo

Protecting critical data is paramount to the Army’s vision for command-centric network operations.

Air Combat Command Pursues Zero Trust Architecture

July 14, 2020
By Kimberly Underwood
Put simply, zero trust architecture (ZTA) is a "standard security door, and it’s a door that we can put in front of any application on our networks,” says Col. James Lotspeich, USAF, chief technology officer, Air Combat Command (ACC), Directorate of Cyberspace and Information Dominance (A6). The ACC is pursuing two ZTA pilot programs to improve cybersecurity. Credit: Shutterstock/Gomolach

The command has two pilot programs underway to employ the cybersecurity tool.

Internet Power and Control May Fall Simply Into China’s Lap

July 8, 2020
By Robert K. Ackerman
Credit: Shutterstock/metamorworks

The growth of the Internet itself may provide China with all the country needs to control it.

China's Long March to Telecommunications Primacy Picks up the Pace

July 2, 2020
By Robert K. Ackerman
Credit: Shutterstock/AlexLMX

Chinese telecommunications technology is not being welcomed with open arms around the world, but alternatives are few.

Army Commands Transfer DODIN Cyber Defense Duties

July 1, 2020
By George I. Seffers
The NETCOM Network Enterprise Center provided extended information technology support to many of the units deploying in support of Joint Task Force-Civil Support during the COVID-19 pandemic. U.S. Army Cyber Command has now delegated to NETCOM some its authorities for protecting Army portions of the Department of Defense Information Network. U.S. Army photo by Spc. Chafelmer Kroll

NETCOM is now in charge of the Army’s worldwide regional cyber centers, and Army Cyber Command can increase its focus on electronic warfare and information operations.

Technology Innovation Defines China’s Internet Grab

June 24, 2020
By Robert K. Ackerman
Credit: Shutterstock/Aleksandar Malivuk

China is offering the world a host of new telecommunications advances that would benefit Chinese companies and the country's leadership.

China's Proposed Internet Wrests Control From Users

June 18, 2020
By Robert K. Ackerman
Credit: Shutterstock/AlexLMX

China's efforts to change Internet technology could deny user's some of the strongest points of the global networking system.

Pages