Cyber Blog

A New Law of Robotics

September 20, 2017
By Bob Gourley and Jane Melia
U.S. Army Research Laboratory scientists have demonstrated they can 3-D print drones tailored for specific missions. As unmanned systems proliferate on the battlefield, the military may need to consider a new law of robotics regarding cybersecurity. U.S. Army photo by Angie DePuydt

Experience in cybersecurity has opened our eyes to the need for another law of robotics. 

More Training Boosts Cybersecurity

September 19, 2017
By Maryann Lawlor
Continuous cybersecurity training enables organizations to better use the expertise within their staffs. (Photo by Shutterstock)

A majority of organizations have too few security workers and nearly half do not provide adequate resources for security training.

Buyer Prepare

August 28, 2017
By David Young

The ability to bridge–and often replace–legacy systems with new technology and delivery platforms has never been more critical.

Fortify Networks Now Against the Coming Internet of Things Tsunami

August 22, 2017
By Joe Kim
The Internet of Things is a rising tide presenting major cybersecurity challenges.

Amid the Internet of Things hoopla, serious cybersecurity risks cannot be ignored.

New Cyber Research Service Available to Academia

August 10, 2017

Comodo's service, called Comodemia, provides users access to one of the world's largest cybersecurity data repositories.

We’re Writing Checks—Money Is in Our Pockets

August 4, 2017
By David E. Meadows
Money comes in many forms. Are paper bills or checks the safest way to pay? (U.S. Army photo by Kristen Wong)

Writing checks may be a dying practice, but it provides a measure of financial cybersecurity that could be crucial to individuals.

Startup Company to Provide Malware Analysis

August 2, 2017
The DHS Science & Technology Directorate has announced the transition of a new malware analysis tool to the commercial marketplace.

REnigma, a program designed to analyze malicious software, has spun off from the Johns Hopkins University Applied Physics Laboratory to create startup Deterministic Security LLC. 

Defense Department Expands Classified Mobility Program

August 1, 2017
U.S. Air Force students use a tablet for training and education. The Defense Information Systems Agency is supplying tablets to senior leaders under the one-year pilot program.

The pilot acknowledges the need to enable leaders to work with classified data in a mobile environment just as they would in an office. 

 

University’s Institute for Cybersecurity to Build Cyber Range

July 21, 2017

Officials with the Institute for Cybersecurity at Regent University announced the school is building a state-of-the-art cyber range training facility at its Virginia Beach campus.

U.S. Army Opens Cyber Analytics Lab

July 20, 2017

The U.S. Army Research Laboratory opened the Army Cyber-research Analytics Laboratory.

Rapid Reaction Technology Office Seeks Cyber Solutions

July 13, 2017
In late October, companies will have the opportunity to present cyber solutions to the U.S. Defense Department's Rapid Reaction Technology Office.

The U.S. Defense Department’s Rapid Reaction Technology Office (RRTO) will conduct a solutions meeting in late October.

NATO Releases IoT Draft Report

May 25, 2017
The Internet of Things poses some risks to military forces, a draft report from NATO's Parliamentary Assembly points out. The report will be discussed at the assembly's spring session and will be updated over the summer.

The Parliamentary Assembly will discuss a report urging governments to take a more proactive role in defining the IoT's future at its spring session.

DHS Commercializes Malware Detection Technology

April 28, 2017

The Department of Homeland Security’s S&T Directorate announced the transition of Hyperion, a malware detection technology, to the commercial marketplace.

Innovation Advantages Run Afoul of Reality

April 24, 2017
By Robert K. Ackerman
A panel discussion examines innovation as a security imperative at NITEC 2017 in Ottawa.

The need for innovation in cybersecurity often is stymied by procurement complications.

Humans Join Systems On The Hunt for Threats

April 21, 2017

Threat hunting allows cyber attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.

Army Faces Around-the-Clock Cyber Challenges

March 9, 2017
By Robert K. Ackerman

The U.S. Army must conduct cyber operations at increasingly lower operational levels while being limited in needed authorities.

Even After Being Hacked, Most Americans Neglect Cyber Best Practices

February 13, 2017
By Ali Cybulski

Although Americans expect major cyber attacks to be a way of life in the near future and lack trust in modern institutions to protect their personal data, they fail to follow cyber best practices, the Pew Research Center reports.

U.S. Army Introduces Cyber Fast Track for Civilians

February 13, 2017
The U.S. Army is rolling out a direct commissioning program for the cyber career field that would allow qualified civilians to bypass prerequisites to become an officer.

The U.S. Army is responding to the high demand for cyber experts with a new program that could let qualified civilians be commissioned directly into the service with a rank up to colonel. The Defense Department also is looking into whether the idea could work for the other services.  

 

3rd Annual Florida CyberThon Draws More Students Than Ever

February 14, 2017
By Tony Ferguson
Florida-based students participated in the third annual CyberThon challenge in January.

The third annual CyberThon event drew in more students than ever, providing hands-on cybersecurity, defense training to students of many ages who worked to defeat simulated cybersecurity threats to an online banking network. Students from dozens of Florida schools participated in the challenge hosted by AFCEA's Pensacola "Blue Angels" Chapter.

Trump Administration Should Read and Heed Obama Cyber Report

January 31, 2017
By Ray Rothrock
Image credit: www.bluecoat.com

As the nation deals with intelligence reports of Russian hacks of the U.S. presidential election, some of us in industry are pondering how President Donald Trump will tackle cybersecurity issues. He already has a good road map. In December, the Commission on Enhancing National Cybersecurity issued its “Report on Securing and Growing the Digital Economy.” It is high time the executive branch dug deeply into cybersecurity issues, writes RedSeal's Ray Rothrock.

Pages