National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity; provide them with tools and resources needed to stay safe online; and increase the resiliency of the nation in the event of a cyber incident. This week’s theme is “Recognizing and Combating Cybercrime.”
Major websites such as Twitter, Spotify, Amazon—and AFCEA International and SIGNAL Media—fell victim to successive massive distributed denial of service (DDoS) attacks on Friday. The Internet traffic firm Dyn informed people of the cyber attack after the sites were shut down.
"We have begun monitoring and mitigating a DDoS attack against our Dyn Managed (Domain Name System) infrastructure,” the company said in a statement. “Our engineers are continuing to work on mitigating this issue.” Service was restored late Friday morning. Some customers experienced increased DNS query latency and delayed zone propagation.
NATO Allied Command Transformation and the NATO Communications and Information (NCI) Agency launched yesterday an independent project to research options for streamlining NATO’s cyber capability development and acquisition processes. The final report from RAND Corporation is due in January.
Last year, the Defense Department issued the Cybersecurity Culture and Compliance Initiative (DC3I), a memorandum containing alarming statistics on the actual number of successful network compromises and their causes, and principles for guiding daily operations for network users. The good news is that out of 30 million known malicious intrusions occurring over 10 months, 99.9 percent were prevented.
Last in a four-part series on election cyber vulnerabilities.
Standardizing voter registration processes, voting machines and vote tabulation is the key to eliminating most vulnerabilities plaguing U.S. elections, according to several cybersecurity experts. These standardizations would embed security, enable backups and eliminate many backdoors through which hackers and vote fraudsters currently can warp the results of an election.
Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.
Third in a four-part series on election cyber vulnerabilities.
Second in a four-part series on election cyber vulnerabilities.
This is the first of a four-part series, based on interviews with private sector cybersecurity experts, on the vulnerability of U.S. elections to cyberspace intrusion. The next three parts will focus on voting machines, vote tabulation and potential solutions to existing and future challenges.
Defense and intelligence agencies need more than security tools and solutions to guard against the increasing number of cyber threats. They must create a culture to ensure that the nation’s cyber borders are secure. As highlighted in last week’s blog, it takes just one negligent worker to open the door and throw out the welcome mat to a malicious attacker.
The U.S. Army is fighting fire with cyber fire, applying an “incredible focus” on attacking a primary terrorist threat by creating a task force to concentrate on a single targeted mission, says Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command.
Responding to a rebuke by Defense Department Secretary Ash Carter that the cyber war against the Islamic State of Iraq and the Levant (ISIL) was progressing too slowly, the U.S. Cyber Command launched a unit with the sole task of going after the militant group’s online activity and put Gen. Cardon in charge of that effort.
Naval Information Forces has developed a website for the Navy Cyber IT and Cybersecurity Workforce (Cyber IT/CSWF) Qualification Program. Pertinent ALCOMS, the Navy cyber IT and cybersecurity qualification matrix, designation and appointment letter templates, program checklists and much more can be found on the new site.
The first week of National Cyber Security Awareness Month focuses on promoting cybersecurity for individuals. However, organizations of all types and sizes, especially small businesses, must be aware of the devastating consequences of a cyber domain attack.
October is National Cyber Security Awareness Month (NCSAM) and the U.S. Department of Homeland Security hopes to use the month-long campaign to inform everyone—individuals, nonprofits, the military, private industries, educational institutions and governments—about cybersecurity.
With cyberspace emerging as a critical warfare domain, U.S. military leaders have been forced to dump both old habits and doctrine in the name of network security. These arduous tasks are part of adapting to the new normal of the digital age, which can include contorting Army policies and actions to win modern wars and address global crises, says Essye Miller, the Army’s director of cybersecurity.
Some U.S. Marine Corps cyber warriors are playing their way toward proficiency. The Corps’ Delta Company, Communication Training Battalion, has turned to gamification to foster a new cyber instruction method that is becoming much more than fun and games. Retooling teaching techniques gave rise to what is dubbed “2-3-6 training” to integrate the intelligence directorate with operations and communications, which in military parlance are designated by the numerals 2, 3 and 6.
A defense-in-depth architecture built around a dual-data model reduces the risk of supervisory control and data acquisition networks being hacked or their data being stolen. The dual-data approach makes connecting various sensors and legacy systems easy, and initial tests show that adding a defense-in-depth architecture provides a degree of security not found in many of these networks, which often lack effective protection against intruders.
The vaunted technology edge enjoyed by Western nations risks fading into history because of espionage by nation-states. National competitors and potential adversaries are saving years of research and development and billions of dollars in related expenses by extricating secrets through cyberspace. Both military and commercial organizations are suffering what could amount to devastating losses from opportunistic enemies, and communications and information technologies top the list of desirable targets.
Cyber capabilities have dramatically transformed the battlefield and how conflicts are resolved. Traditionally, battles were fought in conventional domains—land, air, sea, space—using kinetic, psychological and economic means to defeat opponents. In the cyber realm, anything goes. There are no rules. And adversaries are developing advanced cyber capabilities just as quickly as the United States, threatening critical infrastructure and other systems. So-called cyber-to-physical attacks, when hackers target physical buildings, networks and sites, demonstrate the potentially catastrophic results of a successful campaign against power, water and transportation services.