Cyber Blog

Using Security by Design to Protect Supply Chains

September 21, 2021
SolarWinds is using a security by design methodology to strengthen its security and to help protect the software industry’s supply chain. Credit: Shutterstock

Adopting a security by design approach is helping SolarWinds improve its security while also promoting supply chain security with its customers.

The 16th Air Force Enables Zero Trust Advancements

September 21, 2021
By Kimberly Underwood
Lt. Gen. Timothy Haugh, USAF (right c), commander, 16th Air Force (Air Forces Cyber), and Chief M. Sgt. Kenneth Bruce, USAF (r), command chief, 16th Air Force, discuss the 2nd Combat Weather Systems Squadron efforts during a visit at Hurlburt Field, Florida, in April. The command, which spent the last two years integrating information warfare capabilities including weather intelligence, sees zero trust as a core technology. Credit: USAF photo by Senior Airman Robyn Hunsinger

Leader of the Numbered Air Force is fully supporting the “core technology.”

Election Interference Attempts Come from More Countries Than Just Russia

September 15, 2021
By Kimberly Underwood
Gen. Paul Nakasone, USA (c), commander, U.S. Cyber Command, speaks on a panel at the Intelligence and National Security Summit. Photo by Herman Farrer

Other nations have joined the fray in trying to alter our democratic processes and our economic stability.

National Cyber Leader Ponders Response Vectors to Cyber Adversaries

September 14, 2021
By Kimberly Underwood
Chris Inglis, national cyber director, discusses cybersecurity challenges with Suzanne Kelly, CEO and publisher, The Cipher Brief, at the 2021 Intelligence and National Security Summit.

Changing cyber attackers' "thought calculus" is high on his list to accomplish.

CISA Releases Key Cloud and Zero Trust Guidance

September 7, 2021
Posted by Kimberly Underwood
The Cybersecurity and Infrastructure Security Agency has released two key documents meant to raise the cybersecurity practices of government agencies and organizations. The documents, the Cloud Security Technical Reference Architecture and the Zero Trust Maturity Model, are open for public comment through September 30, the agency reported. Credit: Shutterstock/Andrey Suslov

Documents will help guide agencies' secure migration of data to the cloud and development of their zero trust architecture implementation plans.

White House Recovery Chief: Oversight Key to Beating ID Fraud in Government Programs

September 1, 2021
By Shaun Waterman

The key to combating fraud on government benefit programs during the pandemic lies in cooperating with oversight authorities and intergovernmental information sharing.

Pioneer of Federated Identity Concept Urges Fed ID to Abandon the Dream and Move On

August 31, 2021
By Shaun Waterman
Credit: Shutterstock/Mad Dog

It’s time to abandon the dream of an open, federated, multiplayer identity-provider ecosystem and move on, one of the pioneers of the concept told AFCEA’s Federal Identity Forum.

Sponsored: 81 Ransomware Statistics, Data, Trends and Facts for 2021

September 1, 2021
By Rob Sobers

Ransomware attacks are on the rise and continue to be a disruptive force in the cybersecurity industry.

Velocity of Action Underpins New DISA Strategy

August 26, 2021
By Robert K. Ackerman
Lt. Gen. Robert J. Skinner, USAF, DISA director and Joint Force Headquarters (JFHQ) DODIN commander, views five distinct lines of effort as the key to DISA's new strategy. (DISA photo)

The Defense Information Systems Agency (DISA) has a new forward-looking strategy comprising five elements.

Following the Money: Financial System Integrity Makes Identity a National Security Issue

August 24, 2021
By Shaun Waterman
Kay Turner, senior counselor for digital identity, inclusion and payment infrastructure to the director of the Financial Crimes Enforcement Network, addresses the virtual 2021 Federal Identity Forum.

The threat to the integrity of the U.S. and global financial system posed by the crisis in online identity is a national security issue.

DISA Plans No Pressure on Thunderdome

August 18, 2021
By George I. Seffers
Credit: Gerd Altmann/Pixabay

Thunderdome is the Defense Information Systems Agency's solution for zero trust.

Whole-of-Society National Security

August 17, 2021
By George I. Seffers
Panelists discuss cybersecurity and cooperation among nations during TechNet Augusta 2021. Photo by Michael Carpenter

The term “whole of government” has been popular since at least the early 2000s to describe an effort to gain an advantage or keep the nation secure. But a whole-of-government approach may not suffice in the cyber, space and information era.

Ensuring the Feasibility of Zero Trust

August 20, 2021
By Kimberly Underwood

The 16th Air Force’s 688th Cyberspace Wing is making sure the operational and engineering aspects of missions and base operations work with zero trust.

Zero Trust Is Key Enabler of Air Force’s Agile Combat Employment

July 22, 2021
By Kimberly Underwood
U.S. Air Force airmen at Andersen Air Force Base, Guam, work to refuel an F-35A Lighting II aircraft assigned to Eielson Air Force Base, Alaska during the Cope North exercise in February. The airmen were conducting agile combat employment, or ACE, training during the exercise. The service’s ACE operations, which aim to bring more agility, resiliency and deterrence in a near-peer competitive environment, will be supported by its zero-trust architecture platforms. Credit: Pacific Air Forces/Senior Airmen Jona

The service’s move to send groups of multicapable airmen in an agile, dispersed manner from main operating bases will be supported by the emerging cybersecurity measure.

The Past Can Profit Cyber Planning

July 1, 2021
By Maryann Lawlor
Gen. Paul M. Nakasone, USA, tells Army National Guard soldiers U.S. Cyber Command is only as good as all the components, including Active, Reserve and National Guard. Photo by Steven Stover, 780th Military Intelligence Brigade

Battling terrorists resulted in knowledge to fight near-peer adversaries.

Security, AI Top List of Naval Network Integration

June 30, 2021
By George I. Seffers
Security and artificial intelligence enabled by cloud computing and DevSecOps are top capabilities needed for integrated networking for the U.S. naval forces, including the Navy, Marine Corps and Coast Guard. Credit: U.S. Coast Guard photo

Asked about the changes needed deliver the networking capability needed for a major conflict with a peer or near-peer adversary, experts agreed security is a top priority along with AI. 

Cyber May Call the Shots in the Next Conflict

June 29, 2021
By Robert K. Ackerman
An information systems technician troubleshoots the automated digital network system aboard the USS Theodore Roosevelt. Greater network integration is vital to prevent an adversary from pre-empting a kinetic operation by purely a cyber attack. Credit: MC2 Mar'Queon Tramble, USN

Cyber ultimately be the determining domain if a capable adversary achieves its combat goals before it even fires a kinetic shot.

Interoperability Key in Navy Fight Against Cyber Adversaries

June 23, 2021
By Robert K. Ackerman
Quality assurance specialists at the Naval Information Warfare Center Pacific inspect network racks in the center's Network Integration and Engineering Facility. The Navy is tasking industry with providing cybersecurity solutions that are interoperable across the service. (Credit: Rick Naystatt, U.S. Navy)

Future Navy cybersecurity tools must be interoperable if the fleet is to defend against oncoming threats.

Air Force Greatly Widens the Aperture on Zero Trust

June 22, 2021
By Kimberly Underwood

The service is aggressively going after the emerging cybersecurity method.

Sponsored: Comprehensive Cybersecurity for Maintaining Tactical and Strategic Naval Dominance

June 14, 2021
Credit: ZinetroN/Shutterstock

Current acquisition and infrastructure programs cannot keep pace with the threat environment.

Pages