Cyber Defense Information Assurance, Round Rock, Texas, has been awarded a $14,793,364 modification (P00007) to exercise an option on previously awarded contract (FA8773-15-C-0045). Contractor will provide Air Force enterprise-level network management, optimized communications and defensive measures at the Air Force Information Network Gateways. Air Force Intranet Control operates the common user virtual private network mesh tying the components of the Air Forces intranet together and protecting Air Force network traffic through encryption as it traverses public infrastructure. Work will be performed at Maxwell-Gunter Air Force Base, Alabama, and is expected to be complete by July 8, 2018.
Telos Corp., Ashburn, Virginia, has been awarded a $26,978,951 predominantly firm-fixed-price and cost reimbursement contract for De-Militarized Zone (DMZ) upgrade. Contractor will provide modification and replacement of the aging DMZ that will include networking equipment composed of a suite of equipment, known as a kit, that contains a firewall, intrusion prevention and intrusion detection systems, anti-virus software, web-portal capability and security management. Work will be performed at Robins Air Force Base, Georgia; Beale Air Force Base, California; Langley Air Force Base, Virginia; Ramstein Air Base, Germany; and Wichita, Kansas, and is expected to be complete by April 17, 2019.
Vencore Labs Inc., doing business as Applied Communication Sciences, Basking Ridge, New Jersey, has been awarded a $7,719,472 cost-plus-fixed-fee contract for a research project under the Extreme DDoS Defense (XD3) program solicited under DARPA-BAA-15-56. The XD3 program seeks to develop revolutionary advances in the area of resilient defenses against distributed denial of services (DDoS) attacks on computer networks. Fiscal 2015 research, development, test and evaluation (RDT&E) funds in the amount of $725,155; and fiscal 2016 RDT&E funds in the amount of $1,429,743 are being obligated at time of award.
The Defense Department announced today that it will invite vetted hackers to test the department’s cybersecurity under a unique pilot program. The “Hack the Pentagon” initiative is the first cyber bug bounty program in the history of the federal government.
The U.S. Defense Department’s Office of Small Business Programs (OSBP) has explored some options, such as online training videos, to integrate cybersecurity into its existing efforts, but as of July had not yet identified and disseminated cybersecurity resources in its outreach and education efforts to defense small businesses, according to a recent report by the U.S. Government Accountability Office (GAO).
The U.S. government is just as vulnerable to cyberthreats—if not more so—compared to two years ago, according to a new survey of federal information security professionals. Nearly half of approximately 1,800 respondents indicated that security has not improved in the federal space; while another 17 percent stated their organization’s security posture is actually worse off, primarily due to an inability to keep pace with threats, a poor understanding of risk management, inadequate funding and not enough qualified professionals.
U.S. Marines are testing skill sets integrated with technology in an effort to succeed in a combined conventional warfare/cyber warfare setting, employing devices such as integrated head-mounted displays and sensors on the battlefield and avoiding information overload.
Calling all mathematicians: The Defense Department’s main research arm seeks help in developing a program that essentially would lead to unhackable computer software programs.
The Defense Advanced Research Projects Agency (DARPA) released a broad agency announcement looking for innovative research proposals in the area of program obfuscation, according to the published solicitation. “Proposed research should investigate innovative approaches that enable revolutionary advances in science, devices or systems.”
Northrop Grumman Information Technology, McLean, Virginia, is being awarded an $11,607,556 task order under previously awarded firm-fixed-price contract to exercise option year one for Computer Network Defense Service Provider (CNDSP). The Marine Corps Network Operations and Security Center (MCNOSC) is an operational and staff organization supporting the global Marine Corps Enterprise Network (MCEN) command and control capabilities for Fleet Marine Forces and garrison forces stationed around the world. The MCNOSC executes full spectrum network defense on the global MCEN to include protection, detection, response, and sustainment functions in alignment with the CNDSP program's governing directives. The Marine Corps Systems Command, Quanti
Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?
While it’s still too early to deliver a definitive verdict on emerging behavioral analytical tools, cyber experts who led various security workshops and delivered speeches at Raytheon’s annual cybersecurity symposium touted such programs as the way forward.
The recent rash of cyber attacks on major U.S. companies has drawn renewed focus on network vulnerabilities, both in commercial and governmental sectors, and not just on external attackers but on potentially more ominous threats posed by insiders.
East: Joint Warfighting 2013 Online Show Daily, Day 1
Adm. William E. Gortney, USN, commander, U.S. Fleet Forces Command, set the tone for East: Joint Warfighting 2013 taking place at the Virginia Beach Convention Center, Virginia, May 14-16, when he opened the conference by talking about changes and choices in today’s morning keynote address. Although the obvious change is the reduction in financial resources, the other is one that has been mentioned at previous AFCEA International conferences: the shift in focus from Southwest Asia to the entire Pacific region.