Cyber Blog

Living in a Post-Truth World

May 23, 2018
By Julianne Simpson
“Russia is not a resurgent power. Russia is a remonstrate power,” said Gen. Michael Hayden, USAF (Ret.), principal, the Chertoff Group, during his morning keynote at the AFCEA/GMU Critical Issues in C4I Symposium.

The United Sates must combat the Russian information machine.

Creating Situational Awareness with Analytics

May 22, 2018
By Julianne Simpson
During her morning keynote, Stempfley stressed the importance of using analytics to create situational awareness in cybersecurity.

Situational awareness is key to cybersecurity and using analytics can help create the situational awareness needed to defend the nation from adversaries.

Machine Learning Advances Can Strengthen Cyber Defense

May 17, 2018
by Kimberly Underwood
Mark Russinovich, chief technology officer, Microsoft Azure, discusses machine learning at the AFCEA Defensive Cyber Operations Symposium.

Machine learning has advanced to the point where sophisticated methods can be more effective at cyber event detection than traditional methods.

Refining STEM Education to Raise the Bar for Cyber

May 16, 2018
By Kaitlyn Cotter
Panelists discuss STEM education and training cyber warfighters during a panel at the Defensive Cyber Operations Symposium.

From Head Start programs to internships and mentoring, panelists agree preparing the next generation of cyber warfighters comes down to facilitating opportunity.

Co-Ed Cyber Teams Optimize Talents

May 16, 2018
By Beverly Cooper
Panelists discuss women in the cyber workforce during a session at the Defensive Cyber Security Symposium.

It is critical to bring more women into cyber fields, not only to fortify the cyber workforce with more talent but also to apply the power of diversity that can lead to better solutions.

A Holistic Approach to Cyber Training

May 16, 2018
by Kimberly Underwood

The Army’s Cyber Center of Excellence is hitting its initial stride in training cyber operators.

Data-Driven Framework Attacks the Cyber Monster

May 16, 2018
By Beverly Cooper
Credit: Shutterstock

Framework performs threat-based cybersecurity architecture assessments to ensure DOD leadership has the insight to make well-informed, prioritized cybersecurity investment decisions.

Leaders Push for Innovative Cyber Information Sharing

May 17, 2018
Kimberly Underwood
Panelists discuss partnerships in cyber warfare at the AFCEA Defensive Cyber Operations Symposium.

As the backstop for the nation’s cyber warfare, the military should look to more partnerships to improve its defenses.

Defending the DODIN

May 17, 2018
By Kimberly Underwood
Panelists at the Defensive Cyber Operations Symposium discuss directing change to organize the cyberspace warfighting domain.

Protecting the nation's military network is a nonstop, challenging job.

DISA Director Provides a 3D Outlook

May 15, 2018
By Kimberly Underwood
Vice Adm. Nancy Norton, USN, DISA director and commander of JFHQ-DODIN, speaks at the AFCEA Defensive Cyber Operations Symposium.

The agency is working toward driving innovation, delivering solutions and defending the cyber domain.

DISA Executive Emphasizes Innovation

May 15, 2018
By Kimberly Underwood
Anthony Montemarano, executive deputy director, DISA, speaks at the Defensive Cyber Operations Symposium.

As the Department of Defense is working to improve lethality, it is making the transition to fight in the domain of cyber.

Bug Bounty Offers Big Bucks

April 25, 2018
By Maryann Lawlor
Credit: ChromaWise/Shutterstock

Company challenge targets zero-day exploits that affect Windows, MacOS, iOS and Android.

Marines Delve into Advanced Information Technologies

April 20, 2018
By Kimberly Underwood
The Marine Corps is looking for advanced information technology solutions when it comes to data management, cloud, artificial intelligence and machine learning, Col. Stinson told the industry at the recent AFCEA International Potomac Quantico Chapter event.

To support a more lethal warfighter, the service looks to industry offerings along with improved internal policies to make it all happen.

Army Communicators Advance Agenda

April 5, 2018
By Robert K. Ackerman
Lt. Gen. Bruce T. Crawford, USA, Army G-6 and chief information officer, cites two major changes already bearing fruit as the Army aims for network modernization.

Two major changes already have taken hold as the Army strives to modernize its network.

SpaceX Gets the Green Light for Broadband Satellite System

April 2, 2018
By Kimberly Underwood
SpaceX, which is pioneering the ability to re-use rockets for launches, just obtained governmental approval for a new satellite-based broadband system. Photo courtesy of SpaceX.

The company will deploy 4,425 satellites for the new nongeostationary orbit system.

A More Cyber-Conscious Supply Chain Management

March 29, 2018
By Kimberly Underwood
The Army is learning lessons as it makes its way through cybersecurity vulnerability identification of its major weaponry, according to Col. Bryan Stephens (2nd from l), USA, director, Cyber Focal, Army System of Systems Engineering and Integration, at a recent AFCEA Aberdeen event and interview with SIGNAL Magazine.

The Army is strengthening its cybersecurity posture through a system of systems look.

Aid Organization Turns to Augmented Reality

March 16, 2018
By Kimberly Underwood
As war brutally impacts the smallest citizens of the world, the International Committee for the Red Cross sought to develop an application to tell the story using augmented reality. Credit: Shutterstock/AGorohov

The International Committee of the Red Cross is harnessing high technology to show the impact of war on children.

Army Aims for Agile Acquisition of Offensive Cyber Weapons

March 7, 2018
By George I. Seffers
Lt. Gen. Paul Ostrowski, USA, speak at the AFCEA Army Signal Conference. Photo by Michael Carpenter

Army officials apply the streamlined IT box concept to acquire offensive cyber weapons.

MilCloud 2.0 Rollout Reaches for the Sky

March 12, 2018
By Kimberly Underwood
Now that DISA has provided provisional level 5 authorization for the use of milCloud 2.0, CSRA will be working to add users. Credit: CSRA Inc.

The Defense Information Systems Agency’s second venture into groundbreaking commercial service-based cloud infrastructure gets the green light.

Can You Secure Your Mobile Network Now?

March 2, 2018
By Maryann Lawlor
Image courtesy of BlackBerry

Check out the top 10 enterprise mobile security threats.

Pages