Cyber

January 1, 2017
By Stephanie Domas and Dr. Nancy McMillan

Advances in genomics, medical sensors and data-driven health care increasingly are enabling doctors and patients to make personalized and targeted care decisions. But the effectiveness of these precision medicine capabilities depends on critical cybersecurity components to protect patient privacy and the integrity of patient data.  

January 1, 2017
By Maj. Gen. Earl D. Matthews, USAF (Ret.)

Happy New Year! While I prepared this column well in advance of its publishing date, I unfortunately can predict with reasonable certainty (though I wish I could do this with the stock market) that another major cybersecurity event occurred last week or will occur next week.

January 1, 2017
By Sandra Jontz
Former Supreme Allied Commander Europe Adm. James Stavridis, USN (Ret.), speaks at West 2016, the West Coast’s premier naval conference and exposition. Adm. Stavridis, dean of Tufts University’s Fletcher School of Law and Diplomacy, will speak again at this year’s conference on the topic “Are We Organized and Aligned to Fight the Cyber War?” West 2017 takes place February 21-23 at the San Diego Convention Center.  Photo by Michael Carpenter

The United States endures hundreds of millions of digital attacks every day, from cases of cyber terrorism by nation-states to identity and trade secret theft by digital criminals. The nation has been fending off an unprecedented range of digital threats, escalating both in intensity and sophistication. In spite of hardened networks protected by some of the most advanced programs, the U.S. government increasingly is a prime target.

December 20, 2016
By Capt. Kenneth Parks, USN (Ret.)

There’s no disputing technology’s role in the rapidly changing face of modern warfare. The convergence of commercial services with military applications, such as delivery of real-time data from anywhere using various devices, has changed the physical nature and understanding of what constitutes a combat environment. The U.S. military seeks to define a strategic approach to these converged operations.

December 15, 2016
By David E. Meadows

I first met Richard Hale, the recently retired Defense Department chief information security officer and deputy chief information officer for cyber security, in 2000. I had arrived for duty on the Joint Staff that August where I became the J-6K, relieving Capt. Nick Harris, USAF. The J-6K position held the duties and policy responsibilities for information assurance (IA) under the director for command, control, communications, and computers. The word cyber was starting to be heard in the background and would eventually overshadow the term “information assurance” as a field of network security.

December 13, 2016

The Department of Homeland Security Science and Technology (S&T) Directorate’s Homeland Security Advanced Research Projects Agency has announced that ZeroPoint, an exploit detection and analytics tool, has spun off as a startup company called ZeroPoint Dynamics.

December 6, 2016
By Sandra Jontz

Global security readiness received an overall score of 70 percent, or a C- rating, on the 2017 Global Cybersecurity Assurance Report Card, a decline of six points from last year and lower than the U.S. tally of 78 percent, according to recently released survey results. 

The survey, created by Tenable Network Security and conducted by CyberEdge Group, solicited insights from 700 security practitioners in nine countries and across seven like-industries to calculate the global index score. It measures practitioners’ attitudes and perceptions rather than actual cybersecurity system effectiveness and seeks to determine whether cyber defenses meet expectations.

November 16, 2016
By George I. Seffers
A panel discusses challenges in cyber domain at AFCEA TechNet Asia-Pacific in Hawaii. Photo by Bob Goodwin

Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities.

Hackers, take your mark.

Building on the successes of the U.S. Defense Department’s “Hack the Pentagon” bug bounty program launched earlier this year, it’s now the Army’s turn.

Hackers now can register for the “Hack the Army” bug bounty challenge, a competition modeled after the Defense Digital Service’s “Hack the Pentagon” pilot. The Army program is focused on more operationally relevant websites—specifically those affecting the service’s recruiting mission, according to a news release.

November 17, 2016
By George I. Seffers
Terry Halvorsen, U.S. Defense Department chief information officer, addresses the crowd at AFCEA TechNet Asia-Pacific. Photo by Bob Goodwin

Terry Halvorsen, U.S. Defense Department chief information officer, told the AFCEA TechNet Asia-Pacific audience he is concerned about the cyber threat posed by insiders, but also warned against limiting employees’ sense of freedom.

November 17, 2016
By George I. Seffers
Experts debate whether a cyber attack against common information systems or industrial control systems would be more lethal. Photo by Bob Goodwin

U.S. military and civilian experts on protecting critical infrastructure control systems debated whether a cyber attack on common information systems or on industrial control systems would be more deadly in response to an audience question at the AFCEA TechNet Asia-Pacific conference in Honolulu.

November 15, 2016
By George I. Seffers
Panelists at TechNet Asia-Paciifc 2016 discuss the need for trust in the cyber domain. Photo by Bob Goodwin

Trust—or a lack thereof—is one of the biggest impediments to information sharing among coalitions and partner nations, according to a panel of experts speaking at the AFCEA TechNet Asia-Pacific conference in Honolulu.

October 27, 2016
By Sandra Jontz

As the U.S. Department of Homeland Security’s annual cyber safety awareness campaign winds down, if you’re tired of hearing about online threats and ways to patch vulnerabilities, you’re not alone.

November 2, 2016
By Sandra Jontz
Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force, delivers the luncheon keynote during MILCOM 2016. Photo by Mike Carpenter

The military that can control and deny access to and use of the electromagnetic spectrum will be the victors of the next war, predicts Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force. 

Attaining supremacy within that crucial domain should be driving emerging technologies that will give the U.S. military the technical overmatch on the battlefield, said Matthews, speaking Wednesday at MILCOM 2016, a three-day international conference for military communications.  

October 28, 2016
By Sandra Jontz
Better cybersecurity begins with everyone getting better at assessing risk, said Bob Kolasky (c), deputy assistant secretary for infrastructure protection at the Department of Homeland Security.

Efforts to increasingly digitize networks that run the nation’s critical infrastructure enterprises also are boosting attack surfaces and vulnerabilities in an enduring cybersecurity contest in which hackers target those weaknesses with an elevated furor, experts admonished during a panel discussion on the issue.

November 1, 2016
By Sandra Jontz
Lt. Gen. Alan Lynn, USA, director of DISA and JFHQ-DODIN, addresses cyber-based network issues at MILCOM 2016 in Baltimore. Photo by Mike Carpenter

The future of warfighting is smaller and lighter—technology that will let troops conduct battles from a smartphone or tablet, said Lt. Gen. Alan Lynn, USA, director of the Defense Information Systems Agency, or DISA.

November 1, 2016
By Capt. Ryan Robinson, USA

The burgeoning cyber domain as a battlefront has done more than shift the front lines for warfighters—it has virtually erased them. At the same time, traditional armies continue to threaten U.S. national security both at home and abroad. Given the scope of cyber and conventional warfare, how does the U.S. military balance its competing needs? 

October 26, 2016
By Julianne Simpson
Privacy and security settings exist for a reason. Learn about and use the privacy and security settings on social networks.

According to a recent report by cybersecurity developer Forcepoint, millennials might pose as serious a cybersecurity risk to enterprise networks as cyber criminals. The research found that the baby boomer generation, those aged 51 to 69, are more cautious online while the younger work force is more likely to abandon caution in exchange for digital convenience.

October 25, 2016
By Sandra Jontz

Millennials might pose as grave a cybersecurity risk to enterprise networks as cyber criminals, according to one recent study. With more of them entering the federal workplace, they bring along technology preferences and bad behavior that threaten security of federal IT systems, according to cybersecurity developer Forcepoint.

October 19, 2016
By Julianne Simpson

National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity; provide them with tools and resources needed to stay safe online; and increase the resiliency of the nation in the event of a cyber incident. This week’s theme is “Recognizing and Combating Cybercrime.”

Pages