Cyber Blog

Cyber Technology Dives Into Shark Tank

February 21, 2018
By Robert K. Ackerman
Photo Illustration. Credit: Shutterstock/Dmitri Ma

A shark-tank approach seeks to provide innovative technologies for meeting government cybersecurity needs.

Russia, Iran and North Korea Bolder in Cyber Realm

February 13, 2018
Posted By George I. Seffers

Cyber attacks by these nation-states are becoming more aggressive and more dangerous.

DOD Network Defense HQ Up and Running

February 1, 2018
Posted by Kimberly Underwood
The Joint Force Headquarters Department of Defense Information Network is fully operational, DOD reports. The network defense headquarters spent three years improving capabilities and building capacity to be able to secure and defend the military’s global network. DOD U.S. Strategic Command photo by Adam Hartman, of Petty Officer 2nd Class Ryan Allshouse using an intrusion detection system aboard the USS Ronald Reagan.

The cyber force arm that defends DOD’s 15,000 networks with 3 million users has achieved full operational capability.

Activity Trackers Releasing 'Too Much Information,' DOD Warns

January 31, 2018
By Kimberly Underwood
Army soldiers from the 3rd Infantry Division participate in a 4-mile division run at Fort Stewart, Georgia. The use of fitness trackers by some soldiers is inadvertently revealing their location and outline of military bases. Army photo by Sgt. Caitlyn Smoyer

DOD to study the implications of wearable exercise devices revealing "too much information" about service member locations and military bases.

Russia Could Cut Undersea Communications Cables

January 24, 2018
By Kimberly Underwood
Transatlantic communication cable systems such as the TAT-14, which connects the United States to France, the Netherlands, Germany, Denmark and the United Kingdom, are susceptible to attack, according to a recent report. Photo: Sprint Corp.

Undersea fiber optic cables—indispensable lines of communication between continents—may not be adequately protected.

Educators and Industry Share Outlooks on Cyber

January 18, 2018
By Julianne Simpson
Lt. Gen. Rhett Hernandez, USA (Ret.) (far r), AWest Point chair to the Army Cyber Institute and former commander of the U.S Army Cyber Command, moderates the "Cyber Educator Perspective & Priorities" panel alongside (l-r) Jim Yacone, director of federal operations, SANS Technology Institute; Michael Moniz, Circadence Corporation; David Snow, University System of Georgia; and Robert Quinn, St. Leo University.

Public-private partnerships will be key to the nation's success in cybersecurity.

An Adaptable Cyber Training Environment Is Essential to Success

January 18, 2018
By Julianne Simpson
ol. Paul Stanton, USA, commander, Cyber Protection Brigade, leads his subgroup during a workshop on research and development supporting the cyber training environment and tools at the Cyber Education, Research and Training Symposium.

Attendees at CERTS explored research and development supporting the cyber training environment, as well as solutions.

Services Face Similar Challenges But Take Different Approaches to Cyber

January 17, 2018
By Julianne Simpson
Cyber operators (l-r) Lt. Col. Barian Woodward, USMC; Lt. Col. Angela Waters, USAF; Lt. Col. Benjamin A. Ring, Ph.D., USA; Lt. Jr. Clovis Guevara, USCG; and Col. Paul T. Stanton, USA, panel moderator, address attendees at AFCEA's first Cyber Education, Research and Training Symposium.

Leaders from all five branches of the armed forces shared their perspectives on cyber education and training at an AFCEA symposium.

Federal Agencies Lag Behind in Shoring Up Email Security

January 18, 2018
Kimberly Underwood
Photo courtesy of Proofpoint

According to a recent report by Proofpoint, civilian federal agencies are slow to implement email security measures.

Cyberthreat Update: Efficiency Versus Security

January 17, 2018
By Julianne Simpson
“How can we make security effective and intuitive, yet usable?" Col. Andrew O. Hall, USA, director, Army Cyber Institute, asked attendees at AFCEA's first Cyber Education, Research and Training Symposium.

Col. Andrew O. Hall, USA, opened AFCEA’s first Cyber Education, Research and Training Symposium with a cyberthreat update.

Security Flaws in Computer Hardware Rock Industry

January 8, 2018
By Kimberly Underwood

Google researchers found vulnerabilities in modern computer processors made by leading chip companies; the problem represents a new class of possible attack.

Using Data for Good

December 22, 2017
By Kimberly Underwood
Veterans, active duty military and civilians welcome wounded warriors from all over the country to Huntsville International Airport in Alabama in commemoration of Veterans Week in November. Big data corporation Splunk is partnering with nonprofit veterans’ organizations to make a difference in getting veterans back to work. Army photo by Sgt. 1st Class Teddy Wade.

The holidays are a time for giving; one big data company is working to give back all year long.

Symposium to Connect Cyber Stakeholders with Solution Providers

November 30, 2017
By Julianne Simpson

AFCEA will host its first Cyber Education, Research and Training Symposium in January.

Report Calls for Better Data Sharing

November 8, 2017
By Maryann Lawlor

Automated systems leave out crucial cyberthreat details.

Speed, Resiliency Drive Cybersecurity Ideas

November 2, 2017
By Beverly Cooper
Panelists discuss the need for cybersecurity internationally during TechNet Asia-Pacific.

It is essential to learn from cyber attacks conducted by state and nonstate actors to define resilience for cybersecurity or cyber terrorism.

When Data Is Too Much of a Good Thing

October 31, 2017
By Beverly Cooper
Terry Halvorsen of Samsung Electronics addresses the crowd at TechNet Asia-Pacific.

You often hear that storage is cheap, but all that stored data has an impact on the speed of the data you want.

Protecting Platforms Only the Start

October 31, 2017
By Beverly Cooper
Industry leaders took on the tough topic of cybersecurity and mission assurance at AFCEA TechNet Asia Pacific, l-r: Adm. Richard Macke, USN (Ret.); Douglas Booth, Lockheed Martin; Chris Smith, At&T; Earl Matthews, DXC Technology; Ward Heinke, ForcePoint; and John Merlino, Axis Communications.

Cyber defense and mission assurance require technology solutions, but it is equally important to look at user behavior.

Services Ponder How to Train Like They Fight for Cyber

October 24, 2017
By Kimberly Underwood
Panelists discuss cyber defense at MILCOM 2017 in Baltimore.

The U.S. military must find ways to educate its ranks to respond to cyberthreats.

A New Law of Robotics

September 20, 2017
By Bob Gourley and Jane Melia
U.S. Army Research Laboratory scientists have demonstrated they can 3-D print drones tailored for specific missions. As unmanned systems proliferate on the battlefield, the military may need to consider a new law of robotics regarding cybersecurity. U.S. Army photo by Angie DePuydt

Experience in cybersecurity has opened our eyes to the need for another law of robotics. 

More Training Boosts Cybersecurity

September 19, 2017
By Maryann Lawlor
Continuous cybersecurity training enables organizations to better use the expertise within their staffs. (Photo by Shutterstock)

A majority of organizations have too few security workers and nearly half do not provide adequate resources for security training.

Pages