March 1, 2016
By Andrew F. Coffey, Ph.D.

Rapidly evolving cyberthreats challenge all levels of government, and recent incidents such as the Office of Personnel Management data breach illustrate the importance of shielding public and private-sector organizations from such attacks.

February 22, 2016
By Sandra Jontz

Last year proved lucrative for cyber criminals, and 2016 is shaping up to be even better, with a seemingly unsuspecting victim in the hacking crosshairs: driverless cars, according to Dell Security. In 2015, hackers carried out a massive number of breaches against organizations and government agencies in spite of the millions of dollars spent not only to safeguard networks, but also to hire security experts and train employees on proper cyber hygiene, according to the company’s annual cybersecurity report released Monday.

February 9, 2016
By Sandra Jontz and George I. Seffers

President Barack Obama championed cybersecurity efforts Tuesday in seeking $19 billion for the cause as part of his fiscal year 2017 budget proposal. Additionally, he signed two executive orders to seek to strengthen government networks against cyber attacks while protecting personal information.

The budget proposal for FY17, which begins October 1, is a 35 percent increase over the current fiscal year.

February 1, 2016
By Sandra Jontz
The MUSCLE autonomous vehicle developed by the Centre for Maritime Research and Experimentation, or CMRE, for mine countermeasures works with the NATO Research Vessel Alliance (in the background). The autonomous vehicle is equipped with synthetic aperture sonar.

The buzzwords du jour are cyber at sea, a vulnerability that quickly rose in prominence within the maritime domain to jockey for attention and funding among competing disciplines. Unrelenting cyber attacks firmly positioned the emerging specialty alongside antisubmarine warfare, autonomous undersea vehicles, mine countermeasure systems and port protections, to name a few. NATO’s knowledge repository for maritime science and technology initiatives juggles all of these in its search for innovative security solutions, says Rear Adm. Hank Ort, RNLN (Ret.), director of the Centre for Maritime Research and Experimentation.

February 18, 2016
By Robert K. Ackerman

The U.S. Navy is implementing new technologies and capabilities as it embraces information warfare (IW) as a warfighting domain. These include incorporating IW on existing platforms and greatly expanding disciplines such as electromagnetic maneuver warfare.

February 1, 2016
By Shawn Campbell

Securing the cyber domain commands as much attention as it does effort and dollars—and yet, in spite of years of work to fortify enterprises, it is the fast-paced ecosystem known as the Internet of Things that gravely threatens the security of the world’s greatest military. With mere clicks on a computer, hackers have the knowledge and power to wreak havoc in the defense arena, with experts warning that it is just a matter of time before threats become realities, particularly in three distinctly vulnerable areas of vehicle safety, healthcare and supply chains.

February 1, 2016
By Jim Loerch
U.S. soldiers and an electronic warfare (EW) trainer observe the spectrum of frequencies used for communications during the Marne Focus exercise in June. A group of EW personnel test reaction times by jamming their communications during the exercise.

The realization that the U.S. military is losing its comfortable superiority over the airwaves has propelled the Defense Department to transform the electromagnetic spectrum into a new warfighting domain. This endeavor comes on the heels of the revolutionary doctrine change that established the cyber warfare domain not even a full decade ago.

Until now, cyberthreats have overshadowed electromagnetic spectrum (EMS) concerns. Chiefly, serious cyberthreats to U.S. commerce and national security caused by rapid technological changes siphoned attention and dollars from other domain coffers, including funding to improve the use of EMS.

February 1, 2016
By Robert B. Dix Jr.

As the growth in the capability and sophistication of cyber bad actors continues to threaten national and economic security in the United States, confusion reigns and a lack of clarity exists as to who is in charge and how to deal with a significant cyber event that could become an incident of national or even global consequence. No strategic blueprint provides high level direction, nor do any operational plans articulate roles and responsibilities for government, industry and other stakeholders during various thresholds of escalation throughout a significant cyber event.

February 1, 2016
By Lindsay Clarke

How to best equip cyber warfighters—both at home and abroad—is an ongoing debate complicated by persistently improved and interesting tools for cyber analysis, security and ethical hacking that makes picking the “best tool,” or even “the right tool for the job,” very much a matter of opinion and preference.

January 29, 2016
By Sandra Jontz

With so much cybersecurity focus concentrated on firewalls, intrusion detection systems, Web proxies and other protective measures, Domain Name System, or DNS, attacks have risen as a threat du jour compromising organizations’ networks.

"As all of the other doors to the enterprise are locked, [cyber intruders] found an unlocked door and it’s right now DNS," says Ralph Havens, president and CEO of Infoblox Federal.

January 27, 2016
By Joel Dolisy

Cyber attacks increasingly target the U.S. military and other federal departments, causing these agencies to rely on technology to accomplish their goals, which also increases the size of their attack surface. It’s a Catch-22, and staying one step ahead of hackers trying to infiltrate an IT environment is challenging. It can be nearly impossible if those tasked with protecting that environment don’t have visibility across all of the systems and infrastructure components.

January 7, 2016
By Sandra Jontz

The federal government cautioned its agencies and federal contractors of a network vulnerability that could let hackers access systems. The scurry to inform agencies and instruct them to patch for vulnerabilities occurred after the discovery of unauthorized code during a review of Juniper Networks software.

Juniper is one of the largest providers of firewalls and network software, and the Defense Department is one of its larger federal customers. The revelation prompted federal oversight into the incident, including by officials from the Pentagon and the Department of Homeland Security, amid fears that the hack could permit spying of users' networks.

January 12, 2016
By J. Wayne Lloyd

The season to hunt white-tailed deer draws to a close, and being an avid hunter, I’m already planning for the next season using information gleaned from this go-around in addition to maps, data from trail cameras, temperature input, moon phase and the movement patterns of game. While planning tools are plentiful, they mean little without automation on the back end to make sense of it all.

Deer hunting can be much like cyber hunting, the methodology organizations use when traditional security solutions fail to keep out intruders. 

January 1, 2016
By Michael Semmens

Complying with federal cybersecurity standards, though essential for the defense industrial base and national security at large, presents immense fiscal challenges for smaller businesses that struggle every day to meet the demanding requirements—without breaking the bank.

If not addressed soon, small business noncompliance with the standards spelled out in the Defense Federal Acquisition Regulation Supplement, or DFARS, could have the unintended consequence of severely diminishing the sector’s role in defense contracting, exacerbating concerns about bringing the entire industrial base into compliance. It is a responsibility shared by all businesses doing work for the Defense Department—small, medium and large.

January 1, 2016
By Sandra Jontz
Gathering around a single laptop, soldiers from Team National Guard map out a strategy to win the U.S. Army’s Cyber Center of Excellence’s multiservice NetWar competition in 2014. The exercise was created to build the cyber operators’ capabilities in the new warfighting domain.

A burgeoning breed of combatants fights in a convoluted new domain where no one has blazed a trail, where no history books offer lessons or guidance. These warriors sometimes use untested offensive and defensive network maneuvers to secure cyberspace, the increasingly important and congested battleground rapidly becoming the attack venue of choice.

The technology to succeed in this ongoing fight actually already exists, as does the well-trained work force, experts say. The question now hovers over what ethical guidelines the United States will employ to carry out cyber warfare—where dynamic real-world events shape the malleable rules of engagement.

January 1, 2016
By Gregory Carpenter
This illustration shows perceived activity in the brain, which DARPA scientists are studying to develop treatments for several ailments, including neuropsychological illness brought on by war, traumatic injuries, major depression, post-traumatic stress disorder, borderline personality disorder and general anxiety disorder, to name a few./ Photo courtesy of DARPA

The exciting advent of nanotechnology that has inspired disruptive and lifesaving medical advances is plagued by cybersecurity issues that could result in the deaths of people that these very same breakthroughs seek to heal. Unfortunately, nanorobotic technology has suffered from the same security oversights that afflict most other research and development programs. Nanorobots, or small machines, are vulnerable to exploitation just like other devices.

But the others are not implanted in human bodies.

The phenomenal transformation of computer networks from limited and simple to vast and complex has contributed to such great advances. Great but susceptible advances.

January 1, 2016
By Command Sgt. Maj. Rodney D. Harris, USA
Soldiers with the U.S. Army Cyber Command take part in network defense training. The Army has reclassified its military occupational specialty as 17C for cyber operations specialists, but more remains to be done to build an effective cyber corps for the service.

The U.S. Army and its Cyber Command are building momentum to create the institutional and operational structure required to conduct and support missions in the cyber domain. Now is the time to seriously address the challenges of attracting and retaining soldiers with the talent needed to take on the enemy. As Lt. Gen. Edward C. Cardon, USA, commanding general of Army Cyber Command, often states: Technology, as significant as it is in the rapidly changing face of warfare, will not be the deciding factor in who will dominate in this domain. It’s the people.

December 1, 2015
By Gilliam E. Duvall

On October 1, U.S. financial institutions implemented their latest cybersecurity strategy to stop in-store point-of-sale fraud: the insertion of EMV technology-based chips into credit cards. EMV stands for Europay, MasterCard and Visa and represents the three companies that established the technology protocol. However, many merchants and consumers are not aware that implementing this chip may have inadvertently opened the door to increased cyber crime in a key e-commerce area.

December 3, 2015
By Robert B. Dix Jr.

Leadership and accountability are required to move our nation forward in our collective efforts to improve the national capability to detect, prevent, mitigate, respond and recover from cyber events that may have national or even global consequence. This is such an important arrow in our quiver of national preparedness and resilience that it demands priority attention.

December 2, 2015
By Sandra Jontz

If you thought 2015 was a grueling cybersecurity year, hang on.

“It’s the nightmare waiting to be dreamt,” Bob Hansmann, director of security analysis and strategy for Raytheon-Websense Security Labs says of the next 12 months.

Let’s begin with the 2016 presidential race, which experts predict will launch a slew of new lures and malware intent on defrauding, deceiving and debunking contributors and the candidates and their campaign coffers.

“Candidates and others, even news agencies covering [the race], may be involved as victims targeted by organizations like the Syrian Electronic Army or hacktivists or anyone else with a counter political agenda,” Hansmann warns.