cyber

January 1, 2018
By George I. Seffers
“The most important thing I will predict is that we will stop talking about the technology of cognitive computing. It will be simply a behavior that will be built into any newer system,” says Sue Feldman, a co-founder of the Cognitive Computing Consortium.

Millions of hits result from searching Google for the phrase “how cognitive computing will change the world,” reflecting the public’s big appetite for information about the emerging technology. But some experts foresee a time when the extraordinary is ordinary.

December 28, 2017
By David Mihelcic
Former DISA official David Mihelcic stresses the need to balance IoT convenience and benefits with cybersecurity needs. Credit: PIRO4D/Pixabay

The federal government has invested billions of dollars on Internet of Things (IoT) technologies over the past few years, but it may be compromising its security posture for better information. Certainly being able to share and access the information derived from connected sensors is vital to the protection of the United States and instrumental to military success. However, connected devices present enticing targets, as evidenced by the 2016 Mirai Botnet attack, which originated through vulnerable IoT devices.

January 1, 2018
By Robert K. Ackerman
A soldier with the U.S. Army’s 780th Military Intelligence Brigade sets up deployable cyber tools at the National Training Center in Fort Irwin, California. The Army’s Chief Information Officer (CIO)/G-6 office is working to bring operations, intelligence and policy making closer together in its cybersecurity efforts. Credit: U.S. Cyber Command

The U.S. Army is narrowing the gap between policy and operations as it confronts new threats in cyberspace. Field reports are having greater and faster influence on the issuance of directives, and intelligence is now a major player in determining cyber policy.

“Aligning cybersecurity directly with our operations to achieve readiness is the key to succeeding and moving forward,” says Carol Assi, division chief for cybersecurity policy and governance in the Army Chief Information Officer (CIO)/G-6 office. “And shrinking the gap between operation and policy, having continuous dialogue and working hand in hand, addressing issues in a collaborative environment, [are essential] to that. We no longer can afford to work in silos.”

January 1, 2018
By Maj. Gen. Gregg Potter, USA (Ret.), and Chris Valentino
The U.S. Army Cyber Command’s 41 Cyber Mission Force teams, including the 780th Military Intelligence Brigade operations center at Fort Meade, Maryland, achieved full operational capability more than a year ahead of schedule. Credit: Steve Stover

The U.S. Cyber Command’s Cyber Mission Force must keep pace with a threat landscape that is evolving at an unprecedented tempo. Cyberthreats are constantly growing in volume, velocity and sophistication, and the force needs a warfighting platform that will allow it to get ahead of attackers. That platform should enable continuous improvement through iterative development at the speed and scale of military operations.

January 1, 2018
By Ryan Brichant
One way international military and government agencies gather information about weather and oceanographic data to enhance forecasting and environmental models is through networked buoys. The Royal Danish Air Force deployed these ice-hardened buoys from a C-130 into the Arctic Ocean in September as part of the International Arctic Buoy Program. Credit: John F. Williams

No longer a curiosity, the Internet of Things has emerged as a highly sought-after technology advantage for organizations worldwide. The federal government has stepped up as an innovator within this space, generating profound advancements with seemingly unlimited promise to support national security missions. Those in doubt need look no further than research from the Center for Data Innovation, a nonprofit, nonpartisan institute, which reveals a broad range of eclectic, real-life implementations. 

January 1, 2018
By Milan Balazik and Col. Katerina Bernardova, CZA (Ret.)
The Czech army examines the dynamics within social groups using a technique called sociomapping, which helps analyze an adversary’s team member relationships and applies to offensive cybersecurity team building.

Modern information and networking technologies bring exciting functionalities to everyone, everywhere, all the time. Manufacturers, service providers and users alike welcome the advancements because they boost business opportunities and enable new and better computing capabilities that offer convenience, increase independence and save time.

Plainly, innovations are appealing, but important security aspects are being pushed into the background. Security adds complexity and limitations to functionality. It requires more resources and seems to slow innovation and increase cost. In a military environment, these hurdles can seriously affect mission success.

December 21, 2017
By Thomas Jones
Federal contractors need to be able to show by January 1 they have a plan in place to meet NIST’s new cybersecurity mandate. Credit: geralt/Pixabay

There’s a new National Institute of Standards and Technology (NIST) cybersecurity framework that’s going against the grain. The Department of Defense has mandated that contractors comply with the guidance laid out in NIST special publication 800-171, which aims to strengthen the protection of controlled unclassified information. Why focus contractors’ limited resources on protecting information that is not top secret? Even if information is not top secret it still can be sensitive. For example, social security numbers, contact information, bank account details and other personal information about U.S.

December 19, 2017
By Joe Kim
Artificial intelligence is helping to solve many problems, but humans remain a crucial element for cybersecurity. Credit: GDJ/Pixabay

In the federal government space, the machines have risen, but they’re not here to threaten us. Instead, agencies are turning to artificial intelligence (AI) and machine learning to bolster the U.S.’s cybersecurity posture.

There are many reasons for this emergent interest. Agencies are dealing with enormous amounts of data and network traffic from many different sources, including on premises and from hosted infrastructures—and sometimes a combination of both. It’s impossible for humans to sift through this massive amount of information, which makes managing security a task that cannot be exclusively handled manually.

December 19, 2017
 
A DHS pilot project has secure mobile apps used by first responders. Credit: geralt/Pixabay

A Department of Homeland Security Science pilot testing project helped identify and secure a variety of mobile apps used by first responders.

December 14, 2017
By Kimberly Underwood
From left, the Army’s Maj. Gen. Patricia Frost, Maj. Gen. John Morrison, and Maj. Gen. David Lacquement (Ret.) discuss at a recent AUSA event how the Army is integrating electronic warfare capabilities into a multifunction approach with cyber and intelligence operations.

The Army is looking to combine electronic warfare capabilities with intelligence and cyber capabilities, military leaders reported December 13 at AUSA’s Institute of Land Warfare discussion, The Future Force Build and Integration of Electronic Warfare and Information Operations Fields into Cyber. AUSA hosted the event at its headquarters in Arlington, Virginia, as part of its Hot Topic event series.

December 13, 2017
By Bob Gourley and Jane Melia
Due to the varying needs of each agency, the FedRAMP process was designed to find solutions that align only with broad government needs. Credit: Blackboard/Shutterstock

The cloud and data security go hand-in-hand. While cloud computing provides valuable IT architectures and solutions for government agencies, it also requires them to relinquish data security to public cloud service providers. 

December 5, 2018
 

The Department of Defense (DoD) Information Analysis Center’s (IAC) Cybersecurity Technical Area Task (TAT) awarded $37 million to MacAulay-Brown, Incorporated of Dayton, Ohio. Under the task order, the company will provide cybersecurity and information systems support to the Air Force Research Laboratory's (AFRL's) Enterprise Business System (EBS).

December 1, 2017
By George I. Seffers

A lightning strike last year delivered a new way for Marianne Bailey, the National Security Agency’s new deputy national manager for national security systems, to illuminate the cybersecurity threat.

The bolt burned Bailey’s house, and the burglar alarm was one of the last items she replaced. “The poor burglar alarm guy was telling me about all this great capability where I can get this thing on my smartphone, and I can turn it on and turn it off,” she relates.

Her response: “I want the dumb one that’s not connected to Wi-Fi.”

December 1, 2017
By Robert K. Ackerman
U.S. Special Operations Command (SOCOM) personnel and partner nation representatives examine SOF radio equipment at Air Force Special Operations Command. SOCOM seeks radios that are independent of partners or places so that SOF operators on the move can communicate seamlessly.

Cutting the communications cord is a goal of the U.S. Special Operations Command as it prepares for missions against a new type of foe. The command is not looking to sever ties with its forces in the field, but instead wants to give them broad-based connectivity to function without being restricted by either environment or operating partner.

December 1, 2017
By Wayne Lloyd
Global information system technology is an integral part of farming. Tampering with these devices via the Internet could cause farmers to make decisions based on faulty data.

By 2025, an estimated 75 billion or more devices will be connected via the Internet. While the ability to access data on any device from any device multiplies productivity exponentially, it also creates unforeseeable vulnerabilities that organizations are only beginning to understand.

Last year’s Mirai botnet distributed denial-of-service attack, which infected millions of devices, demonstrates the multifaceted challenges federal agencies and private-sector companies face when securing their devices and networks. These challenges will only continue to grow both inside and outside of these domains.

December 1, 2017
By Maj. Gen. Earl D. Matthews, USAF (Ret.)
A civilian cyber corps could support two of U.S. Cyber Command’s three primary missions: defend Defense Department networks to ensure their data is held securely and defend critical infrastructure.

A civilian reserve cyber corps deserves strong consideration as a way to add more capacity to the cyber work force, which the nation has struggled to do for a number of years. The Civil Reserve Air Fleet (CRAF) could serve as a model for the corps and ultimately help the U.S. government and the Defense Department shore up their shortfall of cyber resources.

November 27, 2017
By Tony Bardo
The new generation of network solutions associated with the EIS contract vehicle will benefit all involved—the agencies, the vendors and the taxpayers. Credit: chombosan/Shutterstock

After analyzing lessons learned from a delay-riddled transition to Networx, where a 33-month long process resulted in a costly overrun of about $395 million, the General Services Administration (GSA) came well prepared to make the Enterprise Infrastructure Solutions (EIS) contract transition a much smoother process.

November 9, 2017
By Kimberly Underwood
Gen. Mark A. Milley, USA, chief of staff of the Army, speaks at CyConUS 2017.

The worldwide cyber conflict is only going to increase and the risks and devastating economic impacts will continue to mount. The United States and other "like-minded" countries must spring into action, increase their cyber warfare capabilities, put in place national cyber policies and promulgate stronger international cyber laws to fend off aggressive cyber actors, warned experts at the CyConUS 2017 conference in Washington, D.C., on November 7. The event was co-hosted by the Army Cyber Institute, West Point and the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, Estonia.

November 9, 2017
By Tom Jenkins
Software-defined networking offers an array of network modernization benefits.

The Department of Defense (DOD) Operational Test and Evaluation Fiscal Year 2016 Annual Report indicates that while there has been significant cybersecurity progress over the past few years, network defense as a warfighting function continues to be undervalued.

Despite the department’s concerted and progressive network modernization efforts, many networks are built on outdated legacy architectures that were never designed to address the challenges posed by continually evolving threat vectors. Neither agile nor flexible enough to be able to adjust, they are vulnerable to the security risks posed by increasingly intelligent, nimble and enterprising hackers.

November 8, 2017
By Maryann Lawlor

The Department of Homeland Security’s (DHS’) Office of Inspector General (OIG) says the department needs to improve how it facilitates cyberthreat information sharing between federal government agencies and the private sector. Although the OIG acknowledges DHS’ progress in enabling sharing among government entities, the department’s system still focuses on volume, velocity and timeliness of information but does not provide the quality, contextual data needed for the private sector to effectively defend against ever-evolving threats.  

Pages