Cyber Blog

Taking Action on Military Internet of Things Devices

November 1, 2019
By Kimberly Underwood
Cyber experts (l-r) Ray Letteer, Will Bush, Jean-Paul Bergeaux and Lisa Lee, discuss the risks of Internet of Things devices during AFCEA Quantico-Potomac’s Annual Cyber Security Panel event on October 31 at Marine Corps Base Quantico.

Military leaders need to address the risks of IoT equipment with a comprehensive strategy, experts warn.

DISA Begins Implementing Fourth Estate Initiative

October 30, 2019
By George I. Seffers
DISA is beginning to implement plans to build a common network infrastructure for 14 defense agencies known as the “fourth estate.” The effort could save hundreds of millions of dollars over the long term. Credit: ktsdesign/Shutterstock

DISA's Fourth Estate Network Optimization (4ENO) Initiative moves to the initial implementation phase and could save hundreds of millions of dollars over the lifetime of the program.

DISA Prototypes Eliminate Cyber Threats Daily

October 30, 2019
By George I. Seffers
DISA’s Cloud Based Internet Isolation prototyping initiative eliminates potential threats from unclassified networks by showing Internet browsers a movie-like representation of the the websites they view. The agency plans to select one of two prototypes in the spring. Credit: Alexander Supertramp/Shutterstock

The Defense Information Systems Agency (DISA) Cloud Based Internet Isolation prototyping effort is already eliminating cyber threats every day.

 

Information Technology the New Sextant for the U.S. Navy

October 9, 2019
By Robert K. Ackerman
A U.S. Navy lieutenant stands watch in the command control center aboard an amphibious transport dock ship as part of the Boxer Amphibious Ready Group and 11th Marine Expeditionary Unit team. The Navy and the Marine Corps are undertaking a rebuild of their information technology capabilities in the face of increased global threats.

The U.S. Navy is striving for revolutionary information technology capabilities as it confronts new threats.

NSA Creates Cybersecurity Directorate

October 2, 2019
Posted by George I. Seffers
The NSA's new Cybersecurity Directorate will initially focus on securing weapon systems and the defense industrial base. Credit: Shutterstock/honglouwawa

The organization will help secure weapon systems and the defense industry.

Air Force Creates 16th Air Force

September 19, 2019
By Kimberly Underwood
Once approved for his new role as commander of the Air Force's new information warfare Numbered Air Force, Maj. Gen. Haugh will be the Air Force’s representative to the U.S. Cyber Command, among other roles.  Photo Credit: U.S.  Air Force

In the next month or so, the U.S. Air Force will be standing up its latest Numbered Air Force, the 16th Air Force, leaders report.

Lessons Learned Fuel U.S. Intelligence in Cyberspace

September 5, 2019
By Robert K. Ackerman
A phalanx of U.S. intelligence chiefs review the community's progress to close out the Intelligence & National Security Summit. Pictured are (l-r) panel moderator David Ignatius, associate editor and columnist, The Washington Post; Lt. Gen. Paul M. Nakasone, USA, commander, CYBERCOM and NSA; Christopher Scolese, director, NRO; Lt. Gen. Robert P. Ashley, USA, director, DIA; Vice Adm. Robert Sharp, USN, director, NGA; and Paul Abbate, associate deputy director, FBI. Credit: Herman Farrer Photography

The U.S. intelligence community has made great progress against adversaries' new tactics and capabilities, but challenges still loom.

The United States Is Taking Action Against Cyber Foes

September 5, 2019
By Robert K. Ackerman
Describing U.S. actions against cyber attacks at the AFCEA/INSA Intelligence and National Security Summit are (l-r) panel moderator David Sanger, The New York Times; Lt. Gen. Stephen G. Fogarty, USA, commander, U.S. Army Cyber Command; Rick Howard, chief security officer, Palo Alto Networks; Jeanette Manfra, assistant director for cybersecurity, DHS; and Tonya Ugoretz, deputy assistant director for cyber, FBI. Credit: Herman Farrer Photography

The United States is waging active cyber operations against nations that conduct information operations against it.

Army Enters Cyber and Electronic Warfare Renaissance

August 23, 2019
By George I. Seffers
The Multi-Function Electronic Warfare-Air Large program will integrate an offensive electronic warfare pod onto an MQ-1C Gray Eagle unmanned aircraft system. It, along with two other programs, offers the Army an opportunity for interoperability. Credit: U.S. Army

The U.S. Army is enjoying a renaissance period for cyber and EW technologies and has a chance to lay a foundation of interoperability in cyber systems.

Cybersecuring the Future Soldier

August 23, 2019
By George I. Seffers
Sgt. Gabrielle Hurd, 237th Military Police Company, New Hampshire Army National Guard, shows her team the route they will take before embarking on an overnight hike to the summit of Mount Monadnock, New Hampshire, during an Enhanced Night Vision Goggle-Binocular Soldier Touchpoint in July. PEO-Soldier incorporates soldier feedback into the ENVG-B product and many others which helps the Army integrate the current needs of soldiers with the Army’s future, multidomain battlefield. Photo by Patrick Ferraris

When soldiers become an integrated system, cybersecurity is key.

Army Cyber Center of Excellence May Change Name

August 22, 2019
By George I. Seffers
Maj. Gen. Neil Hersey, USA, commander, of the U.S. Army Cyber Center of Excellence and Fort Gordon, speaks at TechNet Augusta. Photo by Michael Carpenter
The change—if it happens—would follow the lead of the Army Cyber Command.

New Networks Embolden Adversaries, Add to Cyber Challenges

August 21, 2019
By Beverly M. Cooper
The AFCEA Women’s program convened a panel of cyber experts that included (r-l) moderator Col. Laurie Moe Buckhout, USA (Ret.), Corvus Group LLC; Gisele Bennett, Florida Institute of Technology;  DeEtte Gray, CACI International Inc.; Nancy Kreidler, director, cybersecurity and information, assurance, Army CIO/G-6; and Annette Redmond, acting deputy assistant secretary for intelligence policy and coordination, Bureau of Intelligence and Research, Department of State. Photo by Michael Carpenter

Validating data and information is critical for technical security, but success will also depend on better education and culture change.

Make Room for Unconventional Cyber Warriors

August 20, 2019
By George I. Seffers
Air Commodore Elanor Boekholt-O’Sullivan, Royal Netherlands Air Force, speaks about the cyber work force during a panel at AFCEA TechNet Augusta. Photo by Michael Carpenter

International officials recommend introverts, students on the autism spectrum and middle-aged career changers for the cyber workforce.

An Imperative for Action Brings On Cyber Advantages

August 20, 2019
By Beverly M. Cooper
Lt. Gen. Stephen Fogarty, USA, commanding general, U.S. Army Cyber Command, sketches a graphic to detail his talk during AFCEA TechNet Augusta. Photo by Michael Carpenter

Bureaucracy must step aside to enable information warfare operational success.

DISA Delivers Capabilities to the Warfighting Edge

August 20, 2019
By George I. Seffers
A DISA panel discusses how the agency is delivering capabilities to warfighters at AFCEA TechNet Augusta. Photo by Michael Carpenter

DISA continues to add capabilities available to warfighters and to the broader Defense Department community.

Government Experts Tell Congress that FedRAMP Needs Some Work

July 18, 2019
By Kimberly Underwood
After five years in use, the Federal Risk and Authorization Management Program, known as FedRAMP, offers benefits to federal governmental agencies, as well as some challenges, experts tell Congress. Credit Shutterstock/Blackboard

After five years in use, the federal approval process for cloud services offers benefits, amid some challenges.

U.S. Cyber Command Lists Technical Challenge Areas

July 17, 2019
Posted by George I. Seffers
U.S. Cyber Command officials recently released a list of tough technical challenges areas, for which solutions may not yet exist. Credit: DR MANAGER/Shutterstock

The U.S. Cyber Command has released a list of 39 challenge problems fitting under 12 categories.

House-Passed NDAA Includes Key Cyber Provisions

July 15, 2019
By Kimberly Underwood
The U.S. House of Representatives, led by Democrats, passes its version of the annual defense spending authorization bill, which will have to be ironed out with the Republican-led Senate. Credit: Shutterstock/Turtix

The House of Representatives' bill features supply chain risk measures and DOD cyber protections and operations.

As-A-Service Technology Models Can Help the Military, U.K. Report Claims

July 10, 2019
Posted by Kimberly Underwood
Advanced digital tools, accessed through as-a-service models, offer benefits to the military, a study from Frost &Sullivan says. Credit: Shutterstock/Titina Ongkantong

Digital platforms give users access to advanced commercial computing tools, which can improve readiness.

Cyber Militia Launches Nonprofit to Share Technology

June 19, 2019
By George I. Seffers
The Missouri Cyber Team, a part of the National Guard, developed RockNSM an open source cybersecurity system. Now, they are building a nonprofit organization to help share that system with others. Credit: Missouri National Guard Cyber Team

Creating a nonprofit organization ensures that a cybersecurity solution created by the Missouri National Guard Cyber Team will remain freely available.

Pages