Of all the threats facing U.S. military forces, the greatest worry for Adm. James Stavridis, USN (Ret.), is the dynamic, manmade world of cyber.
The third annual CyberThon event, held at Naval Air Station Pensacola, Florida, provided hands-on cybersecurity defense training to students of many ages who worked to defeat simulated cybersecurity threats to an online banking network.
More than 140 Florida-based students from dozens of schools across the northwest participated in CyberThon 2017, a challenge event hosted by AFCEA’s Pensacola “Blue Angels” Chapter. After two days of spirited competition, teams from the University of West Florida (UWF) and J.M. Tate High School took first place in the college and high school divisions, respectively.
Cybersecurity does not keep most Americans awake at night, even though many expect major cyber attacks to be a way of life in the near future and place little trust in modern institutions to protect their personal data, reports the Pew Research Center. The center’s national survey of more than 1,000 adults last spring showed that even as confidence in data security declined, Americans failed to follow digital security best practices.
The U.S. Army is rolling out a new cybersecurity career management program that could let qualified civilians bypass prerequisites and be commissioned directly into the service with a rank up to colonel.
The Defense Department has directed all military services to research the idea and submit findings by 2020 to determine if a pilot program should be implemented across the department. But Brig. Gen. Patricia Frost, USA, director of cyber for the Army’s G-3/5/7, explains that the Army decided to respond to the high demand for cyber experts more quickly. “We’ll see if the other services do something similar,” she states.
Today marks the 14th annual Safer Internet Day, a global campaign to make the cyber domain a littler safer, especially for children. This year’s theme, “Be the change: Unite for a better Internet,” highlights how all of society has a role to play in cybersecurity, and that working together creates a safer Internet, according to a campaign statement.
Cleaner, more modular software that can be updated with less fuss tops the U.S. Navy’s wish list as it girds its fleet for warfighting in cyberspace. These advances would not only help the service stay atop the wave of information system innovation but also contribute to better security amid growing and changing threats.
The Navy wants industry to develop operating systems and software from the start with fewer bugs. These software products should have fewer vulnerabilities that can be exploited by an adversary, which compound the service’s efforts at cybersecurity.
As the U.S. federal government overcomes the challenges of moving data to the cloud, disruptive changes in research, development and operations may emerge. Military and civil government organizations are seeking similar outcomes as they attempt to migrate their data services to the cloud. The federal government, specifically, is counting on the cloud to help clear up the fog of acquisition and the morass of inefficiency. Experts believe that growing data storage on the cloud can be achieved without complex and costly procurements, and new capabilities and security measures can be deployed much faster when needed.
The U.S. government has no cohesive or detailed retaliatory response to the increasing number of cyber attacks against national interests and security, a shortcoming that top U.S. intelligence leaders said disrupts the development of a deterrence framework.
The government struggles to effectively derail nation-states and cyber intruders that repeatedly have highlighted U.S. vulnerabilities in a string of notorious incidents, officials testified Thursday at a Senate committee hearing on foreign cyberthreats to the United States.
The Army Cyber Center of Excellence is requesting research papers that address specific areas that answer learning demands or capability gaps that inhibit operational force effectiveness or efficiency. Among other things, the research papers will be used to evaluate emerging concepts against documented Army Signal, cyberspace and electronic warfare capability requirements.
Ideally, writers will have an interest in addressing signal, cyberspace and electromagnetic spectrum critical capability needs and may come from government solution providers, commercial vendors or academic institutions.
The U.S. Secret Service is putting into place its first-ever cyber and information technology strategic plan, which provides a path forward through 2021. Among other goals, the plan calls for the agency to build a world-class network operations security center and to continue the march toward greater mobility for special agents and uniformed officers.
According to a recent survey of more than 1,000 participants at 20 different agencies, federal employee behaviors on mobile devices are putting sensitive government data at risk. Whether agencies realize it or not, federal employees are taking their work home with them—even if an agency does not allow the practice.
As many as 50 percent of federal employees access work email from their personal device, and another 49 percent use their personal device for downloading work documents. There is a significant amount of data movement between personal and work accounts. Any organization, federal or not, should strive for visibility and control over where its data goes.
What will you be doing in 20 years? Have you planned that far ahead? As anyone who thought floppy disks or landlines would stand the test of time knows, predicting that far out is a challenge, especially when it comes to technology. But the U.S. Army has done just that, outlining its vision for an effective, modern enterprise network in the strategic document “Shaping the Army Network: 2025-2040.”
Advances in genomics, medical sensors and data-driven health care increasingly are enabling doctors and patients to make personalized and targeted care decisions. But the effectiveness of these precision medicine capabilities depends on critical cybersecurity components to protect patient privacy and the integrity of patient data.
Happy New Year! While I prepared this column well in advance of its publishing date, I unfortunately can predict with reasonable certainty (though I wish I could do this with the stock market) that another major cybersecurity event occurred last week or will occur next week.
The United States endures hundreds of millions of digital attacks every day, from cases of cyber terrorism by nation-states to identity and trade secret theft by digital criminals. The nation has been fending off an unprecedented range of digital threats, escalating both in intensity and sophistication. In spite of hardened networks protected by some of the most advanced programs, the U.S. government increasingly is a prime target.
There’s no disputing technology’s role in the rapidly changing face of modern warfare. The convergence of commercial services with military applications, such as delivery of real-time data from anywhere using various devices, has changed the physical nature and understanding of what constitutes a combat environment. The U.S. military seeks to define a strategic approach to these converged operations.
I first met Richard Hale, the recently retired Defense Department chief information security officer and deputy chief information officer for cyber security, in 2000. I had arrived for duty on the Joint Staff that August where I became the J-6K, relieving Capt. Nick Harris, USAF. The J-6K position held the duties and policy responsibilities for information assurance (IA) under the director for command, control, communications, and computers. The word cyber was starting to be heard in the background and would eventually overshadow the term “information assurance” as a field of network security.
The Department of Homeland Security Science and Technology (S&T) Directorate’s Homeland Security Advanced Research Projects Agency has announced that ZeroPoint, an exploit detection and analytics tool, has spun off as a startup company called ZeroPoint Dynamics.
Global security readiness received an overall score of 70 percent, or a C- rating, on the 2017 Global Cybersecurity Assurance Report Card, a decline of six points from last year and lower than the U.S. tally of 78 percent, according to recently released survey results.
The survey, created by Tenable Network Security and conducted by CyberEdge Group, solicited insights from 700 security practitioners in nine countries and across seven like-industries to calculate the global index score. It measures practitioners’ attitudes and perceptions rather than actual cybersecurity system effectiveness and seeks to determine whether cyber defenses meet expectations.
Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities.