The Department of Homeland Security (DHS) has released guidance to help citizens protect themselves from the recent Heartbleed cyberthreat. This bug makes websites that use OpenSSL vulnerable to attacks that could be used to obtain names, passwords and credit card numbers. Steps the department recommends for the public are: change passwords every few weeks; set strong passwords, ideally with letter, number and symbol combinations; use different passwords for different websites; and never share a password.
Once the Joint Information Environment (JIE) is in place, the U.S. Defense Department may be able to deploy secure mobile apps much more quickly than it can with today’s cumbersome process, according to Teri Takai, Defense Department chief information officer.
High school students from six schools across the nation will split $50,000 in scholarships after competing in the CyberPatriot VI competition, a culminating tournament in which participants tested strategies to defend computers and networks against cyber attacks. CyberPatriot kicked off in November, with roughly 1,600 students from all 50 states, D.C., Puerto Rico, Canada, and Defense Departments Dependents Schools in Europe and the Pacific vying for a chance to prove their concepts the best at the National Finals Competition, which wrapped up March 29, 2014.
The 2014 winning teams are:
Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.
The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton and former commandant of the U.S. Coast Guard, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.
The realm of cyberspace, created by the United States, could be the undoing of its next major military operation unless the country regains control of its own creation. The virtual realm was let loose on the world where it was embraced by all manner of users, and some of them are counting on their expertise in it to overcome the overwhelming power of the U.S. military.
The U.S. Navy’s focus on information dominance is increasing along with its reach. Having organized the force along its lines, the Navy now is applying new operational tasks to its menu.
Vice Adm. Ted Branch, USN, deputy chief of naval operations for information dominance and director of naval intelligence, declared at a West 2014 keynote panel that information dominance is a warfighting domain just like air, sea, land and space. And, being successful in information dominance is as important as being successful in those four other warfighting domains. Cyber is just a component of information dominance, the admiral pointed out.
The U.S. intelligence community has taken some flak lately for infiltrating online games, such as Second Life and World of Warcraft. A just-released report commissioned by the Office of the Director of National Intelligence, however, posits that the technology could be abused by extremists.
The U.S. Army announced today that the Army Cyber Command (ARCYBER) headquarters will be located at Fort Gordon, Georgia, consolidating and coordinating Army cyber and network operations under one commander for the first time in its history.
Eight emerging cybersecurity technologies developed by the Department of Energy’s National Laboratories will be featured at the Transition-to-Practice Technology Demonstration Day for Investors, Integrators and IT Companies East event on December 18 in Washington, D.C. The Department of Homeland Security’s Science and Technology Directorate will unveil new capabilities for intrusion detection, removable media protection, software assurance and malware forensics.
Members of President Obama’s Council of Advisors on Science and Technology have found that cybersecurity for government and industry organizations requires a set of processes that continuously couple information about an evolving threat to defensive reactions and responses. In a report to the president, the council shared its six findings and correlating recommendations for remedies to better security information technology in both the public and private sectors.
Defense sector-specific solutions are driving growth in the cybersecurity market and will continue to do so through 2016. According to a Research and Markets report, the escalating amount of data stored in defense information systems and the increased number of cyberthreats are a major driver of this trend. As a result, companies are focusing on developing security products dedicated specifically to the defense sector.
Eight emerging cybersecurity technologies ready for transition into commercial products will be unveiled at the Mayflower Renaissance Hotel on October 9. The U.S. Department of Homeland Security (DHS) Science and Technology Directorate is hosting the event, which will feature intrusion detection, removable media protection, software assurance and malware forensics capabilities.
Recently at the AFCEA International Cyber Security Summit in Bethesda, MD, Army Maj. Gen. John A. Davis, Senior Military Advisor for Cyber to the Under Secretary of Defense, said “Cyber partnerships such as those with the National Security Agency and the Defense Intelligence Agency and external partnerships such as those with industry, international allies and academia represent a transformation in the way DOD approaches cybersecurity.”
For years, the U.S. Defense Department, not surprisingly, took a “do it alone” posture when it came to sharing information and protecting its networks and communication infrastructures from security attacks.
When it comes to cloud computing, there are two items that are top of mind for Dave McClure, Associate Administrator with the General Services Administration (GSA) in Washington, D.C.
One of the world’s leading experts on cybersecurity calls cyber sabotage attacks “the worst innovation of this century.” Cyberweapons have become too dangerous, and cyberattack can lead to visible and important damage to the critical infrastructure or telecommunications. And, attribution is almost impossible.
Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even though they are not the intended targets, according to a leading security expert.
Eugene Kaspersky, chief executive officer and co-founder of Kaspersky Lab, described the threat to SCADA systems to the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C. Kaspersky described several SCADA attacks that already occurred and warns of new potential vulnerabilities.