The National Security Agency (NSA) is poised to deliver an initial cloud computing capability for the entire intelligence community (IC) that will significantly enhance cybersecurity and mission performance, and unleash the power of innovation for intelligence agencies, Lonny Anderson, NSA chief information officer, says.
SIGNAL Online Exclusives
President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president unveiled details Tuesday for new laws toward better cybersecurity, which include a heavy focus on increased information sharing between government and industry. Some experts have said cybersecurity lacks a robust information-sharing plan between the private sector and government and the related safeguards to protect companies that share from prosecution. It's a good start, but not quite enough, some experts say.
Researchers at the Georgia Institute of Technology are investigating so-called side channel signals, low-level emissions from a computer that could allow savvy cyber attackers to illegally access information. By learning more about the signals, researchers may be one day be able to help mitigate the threat.
The Georgia Tech team has developed an algorithm for measuring the strength of the leaks, which will help prioritize security efforts. They now are studying smartphone emissions, which they say may be even more vulnerable. So far, they have looked only at Android devices.
As China, Russia and Iran continue to develop capabilities that could circumvent U.S. missile defenses, technology under development by one defense industry contracting giant has piqued the interest of the U.S. Missile Defense Agency (MDA).
Recently, China reportedly has conducted at least three flight tests of a hypersonic maneuverable glide vehicle that skims the Earth’s atmosphere—technology that adversaries pursue to “find a seam” in U.S. missile defenses, said Mike Trotsky, vice president of air and missile defense business development, Missiles and Fire Control, Lockheed Martin.
The U.S. military can get a bird’s-eye view of a battlefield or humanitarian mission via use of unmanned aerial vehicles (UAVs). Now, it wants to get into buildings without having troops actually step foot inside.
The Pentagon’s main research arm, the Defense Advanced Research Projects Agency (DARPA), circulated a Broad Agency Announcement for its Fast Lightweight Autonomy (FLA) program, focused on acquiring algorithms that would let small, autonomous assets access buildings and navigate the “labyrinth of rooms, stairways and corridors or other obstacle-filled environments,” according to the agency.
Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?
While it’s still too early to deliver a definitive verdict on emerging behavioral analytical tools, cyber experts who led various security workshops and delivered speeches at Raytheon’s annual cybersecurity symposium touted such programs as the way forward.
The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.
Intel Security (formerly McAfee) partnered with Discovery Education to launch a three-year national education initiative with a goal of reaching at least 35 million students with a new program to teach safe cyberpractices.
“Think Before You Link” is the first and only Discovery Education-supported initiative to focus on cybersecurity education with a first of its kind digital safety curricula, Bill Goodwyn, president and CEO of Discovery Education, said during a kickoff luncheon this week.
Technology plays a central role in helping the Department of Veterans Affairs (VA) work smarter, not harder, to medically treat veterans, particularly those who live in rural areas of the nation.
The Veterans Health Administration steered the use of telehealth technology, which now lets cardiac patients heal at home, and might one day help cancer patients avoid long drives to VA hospitals for follow-up care, says Tom Klobucar, deputy director for VA's office of rural health. “Our office of telehealth services actively engages in looking for enterprise-level technological solutions to the questions of access.”
If it’s said good things come in small packages, imagine the edible delights that might come from a 3-D printer.
One day, it might not be left to the imagination as scientists from the U.S. Army’s Natick Research Center are studying just that—printed food. (We wonder if the heated toner smell will be optional.)
The Army has not begun printing food; in fact, it does not yet have a printer. But it has the idea and the funding for next year to research the potential capabilities of 3-D food printers.
A five-year project funded by the Defense Department’s research arm and developed by Northrop Grumman Corporation has netted the world’s fastest integrated circuit amplifier and a place in the record books.
Terry Halvorsen, the Defense Department’s acting chief information officer, is expected very soon to release a new policy revising the role the Defense Information Systems Agency (DISA) plays in brokering cloud services. The changes are designed to speed cloud service acquisitions by preventing bottlenecks created by having only one agency act as broker. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.
Might the recurring data breaches plaguing one large retailer after another be a dress rehearsal for a catastrophic attack that could cripple, if not destroy, the United States and its critical infrastructure? The doomsday rhetoric presented by cybersecurity experts at an issue forum Thursday, while not so calamitous, served as a wake-up call to the enduring cybersecurity vulnerabilities.
The U.S. Army’s Rapid Equipping Force (REF), which quickly fields technologies to meet urgent warfighter needs, intends by the end of November to open an office in Kuwait that will serve warfighters in the Middle East and Southwest Asia. Furthermore, officials are considering the possibility of opening an office in Iraq.
With its developing fleet of autonomous “guard dogs,” the U.S. Navy is becoming more lethal and protective using the same technology.
The sea service is capitalizing on a first-of-its-kind autonomous technology, with software originally developed by NASA for the Mars Rover, which can transform just about any surface vessel into an unmanned platform able to protect other ships or “swarm” hostile vessels, officials say.
A Defense Department-backed research effort seeks emergency expert input and advice on ways to help combat the Ebola epidemic. Sharing to Accelerate Research-Transformative Innovation for Development and Emergency Support, better known as STAR-TIDES, seeks input on methods that can help health care workers better protect themselves while providing better care to patients infected with the deadly virus.
After much anticipation and preparation, the Defense Information Systems Agency (DISA), along with the U.S. Army and Air Force, successfully migrated network traffic through the first of several Joint Regional Security Stacks (JRSS) at Joint Base San Antonio, according to an agency press statement released Wednesday.
The JRSS upgrade is a step toward the realization of the colossal concept of connecting the entirety of the Defense Department’s network system under the Joint Information Environment (JIE).
The recent rash of cyber attacks on major U.S. companies has drawn renewed focus on network vulnerabilities, both in commercial and governmental sectors, and not just on external attackers but on potentially more ominous threats posed by insiders.
The U.S. Army officially activated its Cyber Protection Brigade earlier this month, marking the first time the service has had such a unit. It falls under the Army’s Network Enterprise Technology Command, commonly called NETCOM. As the defensive operations enabled by the brigade ramp up, the Army now also has a cyber branch operating provisionally, which will change the way soldiers are assigned to cyber career fields.
Having a single agency act as the cloud broker for the whole of the U.S. Defense Department's migration to commercial cloud services slowed the process too much, prompting a policy change to divvy up the duties among the services, says the department's acting chief information officer (CIO).
“The current status is [the Defense Information Systems Agency] DISA is still officially the cloud broker, because the memo is not out,” acting CIO Terry Halvorsen said Tuesday during a media roundtable discussion. “But we are going to make changes to DISA’s cloud broker role. The memo should be out by the end of October, maybe even a little sooner.