December 11, 2014
By Robert K. Ackerman

Being able to respond and adapt to changes in combat conditions is as important in cyberspace as it is in the battlespace. Forces must train for changes amid contested environments in cyberspace as they do in conventional battle.

This point was raised in a panel on assured interoperability on the final day of TechNet Asia-Pacific 2014, being held December 9-11 in Honolulu. Panel moderator Rear Adm. Nancy Norton, USN, J-6, U.S. Pacific Command, emphasized the need for maneuver warfare in cyberspace.

December 12, 2014
By Maryann Lawlor

Podcasts are the audio on-demand equivalent of video these days. They are a bit more portable because anyone with a smartphone or tablet can tune in and catch up on episodes—not only all the time but also wherever they want. It’s a bit difficult to watch a movie while driving, although it’s been done. Podcasts also feature one other capability that on-demand viewing does not facilitate: audience participation.

December 10, 2014
By Robert K. Ackerman

The most dangerous threat to the United States may come from cyberspace rather than terrorists, according to a panel of experts. A cyberspace attack could wreak damage that would change the nature of the country, they suggested.

This was one of many issues discussed by a panel on cyber and intelligence on day two of TechNet Asia-Pacific 2014, being held in Honolulu December 9-11. The panelists offered that cyber and terrorism are the most realistic threats facing the United States.

December 10, 2014
By Robert K. Ackerman

The virtual landscape and ongoing technology trends favor cyber attackers throughout the digital realm. And, that imbalance is likely to worsen as more state players exploit new capabilities for inflicting severe damage through cyberspace.

This issue was explored by a panel on cyber and intelligence on day two of TechNet Asia-Pacific 2014, being held in Honolulu December 9-11. All the panelists agreed that the deck is stacked in favor of cybermarauders, and that situation is likely to worsen.

December 10, 2014
By Robert K. Ackerman

The U.S. Cyber Command’s Cyber Mission Force is beginning to enter the fray, but it still lacks full strength and expertise. Teams are being assigned to combatant commands as quickly as possible, yet their missions are still taking shape.

Lt. Gen. James "Kevin" McLaughlin, USAF, deputy commander, U.S. Cyber Command, described the status of the Cyber Mission Force to the breakfast audience at day two of TechNet Asia-Pacific 2014, being held in Honolulu December 9-11. Gen. McLaughlin explained that half the teams focus on defending, while the other half focus on initiating activities.

December 10, 2014
By Robert K. Ackerman

The U.S. secretary of defense recently approved a Department of Defense Information Network (DODIN) concept and Joint Force Headquarters DODIN Operations within the U.S. Cyber Command (CYBERCOM) headed by the director of the Defense Information Systems Agency (DISA). The new organization falls under CYBERCOM, but it is headed by Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA’s director.

Lt. Gen. James McLaughlin, USAF, deputy commander, U.S. Cyber Command, explained this construct to the breakfast audience during the second day of TechNet Asia-Pacific 2014, being held December 9-11 in Honolulu. It represents a shift in focus for cybersecurity.

December 10, 2014
By Robert K. Ackerman

Achieving effective cybersecurity will require instant visibility across the entire defense network. As attacks become more destructive, programs under development such as joint regional security stacks (JRSS) become all the more important, according to the deputy director of the U.S. Cyber Command (CYBERCOM).

Lt. Gen. James McLaughlin, USAF, described this challenge to the breakfast audience at day two of TechNet Asia-Pacific 2014, being held in Honolulu December 9-11. Many cyber attacks today take ownership of systems and destroy information, and any lag in response time is detrimental to the network.

December 9, 2014
By Robert K. Ackerman

The success of the Joint Information Environment (JIE) may depend on the successful implementation of the Joint Regional Security Stacks, or JRSS, according to the Defense Department acting chief information officer (CIO). Terry Halvorsen told the Tuesday luncheon audience at TechNet Asia-Pacific 2014, being held December 9-11 in Honolulu, that JRSS implementation is his office’s top priority for the JIE.

December 8, 2014

Koniag Information Security Services LLC, Chantilly, Virginia, has been awarded a ceiling $6,767,577 modification (P00005) exercising the first option period on a one-year base contract (HR0011-14-C-0048), with four one-year option periods for contractor support services for the Defense Advanced Research Projects Agency (DARPA) Security and Intelligence Directorate (SID). The modification brings the total cumulative face value of the contract to $13,481,154 from $6,713,577. Work will be performed at DARPA Headquarters in Arlington, Virginia, with an expected completion date of Dec. 31, 2015.

November 19, 2014
By George I. Seffers

Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.

November 17, 2014
By Sandra Jontz

Veterans seeking work in the field of cybersecurity can earn certifications through a new scholarship program.

Veterans transitioning to the civilian work force can apply for scholarships to earn one of the following certifications: Certified Cyber Forensics Professional (CCFPSM), Certified Information Systems Security Professional (CISSP), Certified Secure Software Lifecycle Professional (CSSLP), Certified Authorization Professional (CAP), HealthCare Information Security and Privacy Practitioner (HCISPPSM), Systems Security Certified Practitioner (SSCP) or Associate of (ISC)².

October 24, 2014

Booz Allen Hamilton, McLean, Virginia, is being awarded a $6,643,293 task order (P00003) to a previously awarded firm-fixed-price contract (HQ0034-14-A-0023) to provide technical support services for the Department of Defense's Chief Information Officer Cybersecurity and Information Assurance Support program. Work will be performed in Alexandria, Virginia, with an expected completion date of Oct. 16, 2015. Fiscal 2015 operations and maintenance funds in the amount of $6,643,293 are being obligated on this award and will expire at the end of the current fiscal year. This contract was competitively procured, with two proposals received.

October 22, 2014

Reginald Brothers, Department of Homeland Security (DHS) undersecretary for science and technology, today announced the new visionary goals for the department’s Science and Technology (S&T) Directorate.

October 20, 2014

NCI Inc., Reston, Va., has announced that it was awarded a cost-plus-fixed-fee, single-award indefinite delivery, indefinite quantity contract valued at $125 million for cyber network operations and security support (CNOSS) services for the U.S. Army's Network Enterprise Technology Command (NETCOM) G3/5/7. NCI has served NETCOM since 2007, with two predecessor contracts to CNOSS. The new contract has a 12-month base period with two one-year option periods and one six-month option period. NETCOM has primary oversight of network operations and security for the U.S. Army and serves as the single point of contact for network development and protection.

October 9, 2014
By Maryann Lawlor

It’s fall and for many this time of year means apples, pumpkins and long drives to take in the changing colors of the autumn foliage. For some parents of high school seniors, however, this time of year also means scouring and Fastweb searching for answers (and applications) to the question, “If my son/daughter gets into the college of his/her choice, how will we pay for it?” Simultaneously, they are pulling together the information for the Free Application for Federal Student Aid (FAFSA) forms.

October 6, 2014
By Ali Cybulski

As part of National Cyber Security Awareness Month, (ISC)², a nonprofit that educates and certifies information security professionals, is sharing a series of weekly security awareness tips. The series will include tips for more secure software as well as advice targeted at conference attendees, parents, teachers, senior citizens, homeowners and CEOs.

The first set of tips provides guidance for conference attendees, including:

September 30, 2014

SeKON Enterprises Incorporated, Herndon, Virginia, was awarded an $12,433,560 cost-plus-fixed-fee contract, with options, to provide engineering, cybersecurity and configuration management support services to the program executive officer, Defense Healthcare Management Systems. The total potential contract value, including the one-year base period and four one-year option periods, is $75,603,463.

September 30, 2014

LongView International, Reston, Virginia, has been awarded a maximum $8,291,746 modification (P0006) exercising the first option period on a one-year base contract (HT0011-13-F-0039) with three one-year options for software design, development and testing to support emerging requirements in the Defense Medical Logistics Standard Support (DMLSS), DMLSS Customer Assistance Module and Joint Medical Asset Repository applications to meet information assurance and the establishment of new data exchanges/services. Location of performance is at the Joint Medical Logistics Functional Development Center at Fort Detrick, Maryland, with a Sept. 29, 2017, completion date.

September 23, 2014
By Chris LaPoint

When your personal applications are slow, there’s no doubt it’s frustrating. The news clip buffers, the song won’t download, a game takes ages to start up, etc. But when apps perform slowly for military, intelligence or other critical government entities, national security might, in fact, be at risk.

September 22, 2014
By Robert K. Ackerman

The director of the Federal Bureau of Investigation (FBI) views cyberspace as one of the bureau’s top priorities across its entire mission set. Not only is economic national security threatened from cyberspace, it also may hold clues to deterring and preventing crimes—if the bureau can exploit it effectively.

“Cyber touches everything I’m responsible for,” said FBI director James Comey. “It’s not a thing, it’s a way.” Comey described the important of cyberspace at the final plenary session of the AFCEA/INSA Intelligence and National Security Summit 2014, held September 18-19 in Washington, D.C.