cyber

December 19, 2017
 
A DHS pilot project has secure mobile apps used by first responders. Credit: geralt/Pixabay

A Department of Homeland Security Science pilot testing project helped identify and secure a variety of mobile apps used by first responders.

December 14, 2017
By Kimberly Underwood
From left, the Army’s Maj. Gen. Patricia Frost, Maj. Gen. John Morrison, and Maj. Gen. David Lacquement (Ret.) discuss at a recent AUSA event how the Army is integrating electronic warfare capabilities into a multifunction approach with cyber and intelligence operations.

The Army is looking to combine electronic warfare capabilities with intelligence and cyber capabilities, military leaders reported December 13 at AUSA’s Institute of Land Warfare discussion, The Future Force Build and Integration of Electronic Warfare and Information Operations Fields into Cyber. AUSA hosted the event at its headquarters in Arlington, Virginia, as part of its Hot Topic event series.

December 13, 2017
By Bob Gourley and Jane Melia
Due to the varying needs of each agency, the FedRAMP process was designed to find solutions that align only with broad government needs. Credit: Blackboard/Shutterstock

The cloud and data security go hand-in-hand. While cloud computing provides valuable IT architectures and solutions for government agencies, it also requires them to relinquish data security to public cloud service providers. 

December 5, 2018
 

The Department of Defense (DoD) Information Analysis Center’s (IAC) Cybersecurity Technical Area Task (TAT) awarded $37 million to MacAulay-Brown, Incorporated of Dayton, Ohio. Under the task order, the company will provide cybersecurity and information systems support to the Air Force Research Laboratory's (AFRL's) Enterprise Business System (EBS).

December 1, 2017
By George I. Seffers

A lightning strike last year delivered a new way for Marianne Bailey, the National Security Agency’s new deputy national manager for national security systems, to illuminate the cybersecurity threat.

The bolt burned Bailey’s house, and the burglar alarm was one of the last items she replaced. “The poor burglar alarm guy was telling me about all this great capability where I can get this thing on my smartphone, and I can turn it on and turn it off,” she relates.

Her response: “I want the dumb one that’s not connected to Wi-Fi.”

December 1, 2017
By Robert K. Ackerman
U.S. Special Operations Command (SOCOM) personnel and partner nation representatives examine SOF radio equipment at Air Force Special Operations Command. SOCOM seeks radios that are independent of partners or places so that SOF operators on the move can communicate seamlessly.

Cutting the communications cord is a goal of the U.S. Special Operations Command as it prepares for missions against a new type of foe. The command is not looking to sever ties with its forces in the field, but instead wants to give them broad-based connectivity to function without being restricted by either environment or operating partner.

December 1, 2017
By Wayne Lloyd
Global information system technology is an integral part of farming. Tampering with these devices via the Internet could cause farmers to make decisions based on faulty data.

By 2025, an estimated 75 billion or more devices will be connected via the Internet. While the ability to access data on any device from any device multiplies productivity exponentially, it also creates unforeseeable vulnerabilities that organizations are only beginning to understand.

Last year’s Mirai botnet distributed denial-of-service attack, which infected millions of devices, demonstrates the multifaceted challenges federal agencies and private-sector companies face when securing their devices and networks. These challenges will only continue to grow both inside and outside of these domains.

December 1, 2017
By Maj. Gen. Earl D. Matthews, USAF (Ret.)
A civilian cyber corps could support two of U.S. Cyber Command’s three primary missions: defend Defense Department networks to ensure their data is held securely and defend critical infrastructure.

A civilian reserve cyber corps deserves strong consideration as a way to add more capacity to the cyber work force, which the nation has struggled to do for a number of years. The Civil Reserve Air Fleet (CRAF) could serve as a model for the corps and ultimately help the U.S. government and the Defense Department shore up their shortfall of cyber resources.

November 27, 2017
By Tony Bardo
The new generation of network solutions associated with the EIS contract vehicle will benefit all involved—the agencies, the vendors and the taxpayers. Credit: chombosan/Shutterstock

After analyzing lessons learned from a delay-riddled transition to Networx, where a 33-month long process resulted in a costly overrun of about $395 million, the General Services Administration (GSA) came well prepared to make the Enterprise Infrastructure Solutions (EIS) contract transition a much smoother process.

November 9, 2017
By Kimberly Underwood
Gen. Mark A. Milley, USA, chief of staff of the Army, speaks at CyConUS 2017.

The worldwide cyber conflict is only going to increase and the risks and devastating economic impacts will continue to mount. The United States and other "like-minded" countries must spring into action, increase their cyber warfare capabilities, put in place national cyber policies and promulgate stronger international cyber laws to fend off aggressive cyber actors, warned experts at the CyConUS 2017 conference in Washington, D.C., on November 7. The event was co-hosted by the Army Cyber Institute, West Point and the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, Estonia.

November 9, 2017
By Tom Jenkins
Software-defined networking offers an array of network modernization benefits.

The Department of Defense (DOD) Operational Test and Evaluation Fiscal Year 2016 Annual Report indicates that while there has been significant cybersecurity progress over the past few years, network defense as a warfighting function continues to be undervalued.

Despite the department’s concerted and progressive network modernization efforts, many networks are built on outdated legacy architectures that were never designed to address the challenges posed by continually evolving threat vectors. Neither agile nor flexible enough to be able to adjust, they are vulnerable to the security risks posed by increasingly intelligent, nimble and enterprising hackers.

November 8, 2017
By Maryann Lawlor

The Department of Homeland Security’s (DHS’) Office of Inspector General (OIG) says the department needs to improve how it facilitates cyberthreat information sharing between federal government agencies and the private sector. Although the OIG acknowledges DHS’ progress in enabling sharing among government entities, the department’s system still focuses on volume, velocity and timeliness of information but does not provide the quality, contextual data needed for the private sector to effectively defend against ever-evolving threats.  

November 7, 2017
By George I. Seffers
Lt. Gen. Alan Lynn, USA, DISA director, addresses an AFCEA chapter event. Gen. Lynn and other DISA officials provided a forecast of contracting opportunities to industry on November 6.

The Defense Information Systems Agency (DISA) is touting the potential benefits of light fidelity (Li-Fi) technology, a form of wireless, light-based communications. Li-Fi is expected to be more resistant to electronic signature detectors and therefore, less susceptible to electronic warfare techniques.

Lt. Gen. Alan Lynn, USA, the DISA director, stressed the need for the technology during the agency’s November 6 forecast to industry.

He also emphasized the need for software-defined networking, which Gen. Lynn said is inexpensive and versatile. He described a scenario in which warfighters will be able to hop from one network to the next, similar to radios that hop from one frequency to another.

November 6, 2017
By Joe Kim
Five basic steps can help agencies build an advanced and solid security posture.

The government’s effort to balance cybersecurity with continued innovation was underscored last year with the publication of the Commission on Enhancing National Cybersecurity’s Report on Securing and Growing the Digital Economy. The report included key recommendations for cybersecurity enhancements, while also serving as a sobering reminder that “many organizations and individuals still fail to do the basics” when it comes to security.

November 1, 2017
By Kimberly Underwood
Paratroopers from the 82nd Airborne Division engage ISIS militants in artillery fire to support Iraqi and Peshmerga fighters in Mosul, Iraq. U.S. success on the physical battlefield may drive fighting to the cybersphere.

The United States should not underestimate the ability of terrorist organizations such as ISIS to mount cyber attacks against the homeland, says John Mulligan, former deputy director of the National Counterterrorism Center. As the nation works to shrink territorial control of the caliphate in Iraq and Syria, the battlefront extends virtually to the cyber domain, and America must be prepared.

November 2, 2017
By Beverly Cooper
Panelists discuss the need for cybersecurity internationally during TechNet Asia-Pacific.

It is essential to learn from cyber attacks conducted by state and nonstate actors to define resilience for cybersecurity or cyber terrorism. "We need to develop a threat model for cyber resilience. We have to be prudent to distinguish between cyber warfare and cyber terrorism," said Anita T. Abbott, Ph.D., director, adjunct professor, Global Partnership and Development Ltd., during the TechNet Asia-Pacific conference.

November 1, 2017
 
CSRA will manage millions of cybersecurity endpoints for the U.S. Defense Department under a newly awarded $163 million task order.

The U.S. Defense Information Systems Agency (DISA) has awarded a $163 million task order to SRA International, a subsidiary of CSRA Inc. The award directs CSRA to support DISA’s endpoint security solution integrator support effort under the General Services Administration’s Alliant Government-wide Acquisition Contract, the company announced.

November 1, 2017
By Robert K. Ackerman
Units participating in Cyber Quest 2017 execute their battle drills. The U.S. Army’s Cyber Battle Lab uses Cyber Quest exercises as one of several means to experiment with approaches to cyber challenges.

Experimentation is moving to the fore in cyberspace as the U.S. Army seeks to strengthen offensive and defensive cyber forces. This effort is complicated by the inclusion of electronic warfare in a realm that used to belong to signal professionals. With cyberspace maturing as a battle domain, Army experts are exploring cyber modeling and simulation as a key element of their new experimentation approach.

November 1, 2017
By George I. Seffers

A number of emerging technologies, including integrated photonics, microdrones and automation tools, will drive an improved perception of available electromagnetic spectrum by U.S. warfighters and enhanced effectiveness in electronic warfare, says William Conley, deputy director, electronic warfare, Office of the Undersecretary of Defense for Acquisition, Technology and Logistics.

November 1, 2017
By George I. Seffers
A B-2 Spirit lands at Andersen Air Force Base, Guam. The B-2 Defense Management System Modernization program includes upgrades to electronic warfare systems.

William Conley has a long to-do list.

He serves on the U.S. Defense Department’s Electronic Warfare (EW) Executive Committee, which helped draft the department’s EW strategy, signed earlier this year. Now, the deputy director of electronic warfare in the Office of the Undersecretary of Defense for Acquisition, Technology and Logistics is helping to put together an implementation plan for that strategy, which he expects to be signed in the spring.

Pages