January 6, 2017
As many as 40 percent of federal agency employees disregard mobile device policy.

According to a recent survey of more than 1,000 participants at 20 different agencies, federal employee behaviors on mobile devices are putting sensitive government data at risk. Whether agencies realize it or not, federal employees are taking their work home with them—even if an agency does not allow the practice.

As many as 50 percent of federal employees access work email from their personal device, and another 49 percent use their personal device for downloading work documents. There is a significant amount of data movement between personal and work accounts. Any organization, federal or not, should strive for visibility and control over where its data goes.

January 1, 2017
By Bill Lemons
Juniper Networks operates Proof of Concept labs, testing facilities that provide open environments to ensure that customers can access the best demonstration resources possible.

What will you be doing in 20 years? Have you planned that far ahead? As anyone who thought floppy disks or landlines would stand the test of time knows, predicting that far out is a challenge, especially when it comes to technology. But the U.S. Army has done just that, outlining its vision for an effective, modern enterprise network in the strategic document “Shaping the Army Network: 2025-2040.” 

January 1, 2017
By Stephanie Domas and Dr. Nancy McMillan

Advances in genomics, medical sensors and data-driven health care increasingly are enabling doctors and patients to make personalized and targeted care decisions. But the effectiveness of these precision medicine capabilities depends on critical cybersecurity components to protect patient privacy and the integrity of patient data.  

January 1, 2017
By Maj. Gen. Earl D. Matthews, USAF (Ret.)

Happy New Year! While I prepared this column well in advance of its publishing date, I unfortunately can predict with reasonable certainty (though I wish I could do this with the stock market) that another major cybersecurity event occurred last week or will occur next week.

January 1, 2017
By Sandra Jontz
Former Supreme Allied Commander Europe Adm. James Stavridis, USN (Ret.), speaks at West 2016, the West Coast’s premier naval conference and exposition. Adm. Stavridis, dean of Tufts University’s Fletcher School of Law and Diplomacy, will speak again at this year’s conference on the topic “Are We Organized and Aligned to Fight the Cyber War?” West 2017 takes place February 21-23 at the San Diego Convention Center.  Photo by Michael Carpenter

The United States endures hundreds of millions of digital attacks every day, from cases of cyber terrorism by nation-states to identity and trade secret theft by digital criminals. The nation has been fending off an unprecedented range of digital threats, escalating both in intensity and sophistication. In spite of hardened networks protected by some of the most advanced programs, the U.S. government increasingly is a prime target.

December 20, 2016
By Capt. Kenneth Parks, USN (Ret.)

There’s no disputing technology’s role in the rapidly changing face of modern warfare. The convergence of commercial services with military applications, such as delivery of real-time data from anywhere using various devices, has changed the physical nature and understanding of what constitutes a combat environment. The U.S. military seeks to define a strategic approach to these converged operations.

December 15, 2016
By David E. Meadows

I first met Richard Hale, the recently retired Defense Department chief information security officer and deputy chief information officer for cyber security, in 2000. I had arrived for duty on the Joint Staff that August where I became the J-6K, relieving Capt. Nick Harris, USAF. The J-6K position held the duties and policy responsibilities for information assurance (IA) under the director for command, control, communications, and computers. The word cyber was starting to be heard in the background and would eventually overshadow the term “information assurance” as a field of network security.

December 13, 2016

The Department of Homeland Security Science and Technology (S&T) Directorate’s Homeland Security Advanced Research Projects Agency has announced that ZeroPoint, an exploit detection and analytics tool, has spun off as a startup company called ZeroPoint Dynamics.

December 6, 2016
By Sandra Jontz

Global security readiness received an overall score of 70 percent, or a C- rating, on the 2017 Global Cybersecurity Assurance Report Card, a decline of six points from last year and lower than the U.S. tally of 78 percent, according to recently released survey results. 

The survey, created by Tenable Network Security and conducted by CyberEdge Group, solicited insights from 700 security practitioners in nine countries and across seven like-industries to calculate the global index score. It measures practitioners’ attitudes and perceptions rather than actual cybersecurity system effectiveness and seeks to determine whether cyber defenses meet expectations.

November 16, 2016
By George I. Seffers
A panel discusses challenges in cyber domain at AFCEA TechNet Asia-Pacific in Hawaii. Photo by Bob Goodwin

Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities.


Hackers, take your mark.

Building on the successes of the U.S. Defense Department’s “Hack the Pentagon” bug bounty program launched earlier this year, it’s now the Army’s turn.

Hackers now can register for the “Hack the Army” bug bounty challenge, a competition modeled after the Defense Digital Service’s “Hack the Pentagon” pilot. The Army program is focused on more operationally relevant websites—specifically those affecting the service’s recruiting mission, according to a news release.

November 17, 2016
By George I. Seffers
Terry Halvorsen, U.S. Defense Department chief information officer, addresses the crowd at AFCEA TechNet Asia-Pacific. Photo by Bob Goodwin

Terry Halvorsen, U.S. Defense Department chief information officer, told the AFCEA TechNet Asia-Pacific audience he is concerned about the cyber threat posed by insiders, but also warned against limiting employees’ sense of freedom.

November 17, 2016
By George I. Seffers
Experts debate whether a cyber attack against common information systems or industrial control systems would be more lethal. Photo by Bob Goodwin

U.S. military and civilian experts on protecting critical infrastructure control systems debated whether a cyber attack on common information systems or on industrial control systems would be more deadly in response to an audience question at the AFCEA TechNet Asia-Pacific conference in Honolulu.

November 15, 2016
By George I. Seffers
Panelists at TechNet Asia-Paciifc 2016 discuss the need for trust in the cyber domain. Photo by Bob Goodwin

Trust—or a lack thereof—is one of the biggest impediments to information sharing among coalitions and partner nations, according to a panel of experts speaking at the AFCEA TechNet Asia-Pacific conference in Honolulu.

October 27, 2016
By Sandra Jontz

As the U.S. Department of Homeland Security’s annual cyber safety awareness campaign winds down, if you’re tired of hearing about online threats and ways to patch vulnerabilities, you’re not alone.

November 2, 2016
By Sandra Jontz
Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force, delivers the luncheon keynote during MILCOM 2016. Photo by Mike Carpenter

The military that can control and deny access to and use of the electromagnetic spectrum will be the victors of the next war, predicts Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force. 

Attaining supremacy within that crucial domain should be driving emerging technologies that will give the U.S. military the technical overmatch on the battlefield, said Matthews, speaking Wednesday at MILCOM 2016, a three-day international conference for military communications.  

October 28, 2016
By Sandra Jontz
Better cybersecurity begins with everyone getting better at assessing risk, said Bob Kolasky (c), deputy assistant secretary for infrastructure protection at the Department of Homeland Security.

Efforts to increasingly digitize networks that run the nation’s critical infrastructure enterprises also are boosting attack surfaces and vulnerabilities in an enduring cybersecurity contest in which hackers target those weaknesses with an elevated furor, experts admonished during a panel discussion on the issue.

November 1, 2016
By Sandra Jontz
Lt. Gen. Alan Lynn, USA, director of DISA and JFHQ-DODIN, addresses cyber-based network issues at MILCOM 2016 in Baltimore. Photo by Mike Carpenter

The future of warfighting is smaller and lighter—technology that will let troops conduct battles from a smartphone or tablet, said Lt. Gen. Alan Lynn, USA, director of the Defense Information Systems Agency, or DISA.

November 1, 2016
By Capt. Ryan Robinson, USA

The burgeoning cyber domain as a battlefront has done more than shift the front lines for warfighters—it has virtually erased them. At the same time, traditional armies continue to threaten U.S. national security both at home and abroad. Given the scope of cyber and conventional warfare, how does the U.S. military balance its competing needs? 

October 26, 2016
By Julianne Simpson
Privacy and security settings exist for a reason. Learn about and use the privacy and security settings on social networks.

According to a recent report by cybersecurity developer Forcepoint, millennials might pose as serious a cybersecurity risk to enterprise networks as cyber criminals. The research found that the baby boomer generation, those aged 51 to 69, are more cautious online while the younger work force is more likely to abandon caution in exchange for digital convenience.