Cyber Blog

New Cyber Training Unit Empowers Digital Defenders

June 15, 2021
By Kimberly Underwood
Senior Airman Thomas Goodnoe, USAF, tactical network operations technician, 1st Combat Communications Squadron (l), and Staff Sgt. Darryl Terry, USAF, cyber transport supervisor, 1st CBCS, review their systems against their technical guides during a cybersecurity audit in 2017 at Ramstein Air Base, Germany. The Air Force has added a new detachment that will provide initial training to cybersecurity airmen before they reach their mission locations. Credit: U.S. Air Force photo/Staff Sgt. Timothy Moore

Six-month old Air Force detachment takes the burden off of operational units for cyber training.

Cyber Hygiene Key to Protecting Networks in a Changing Online Environment

May 24, 2021
Cyber adversaries are creating a “wild west” environment in cyberspace where organizations must be aware of their security to protect themselves, said Gene Yoo, CEO of Resecurity Inc. Credit: Shutterstock

Combating cyber adversaries is a broad area requiring significant amounts of human intelligence and a deep technical expertise to identify them.

Shall the Children Lead in Cyberspace?

May 19, 2021
By Robert K. Ackerman
 Credit: metamorworks/Shutterstock

Starting cyberspace education early for children can benefit both their families and a profession starved for budding young experts.

Improving Identity Security and Management in a Cloud Environment

May 19, 2021
Cloud-based security architectures can help federal agencies protect their infrastructure and manage change as it occurs, says Sean Frazier, federal chief security officer at Okta Inc. Credit: Shutterstock

Government agencies can benefit from cloud-based security architectures.

People Power Army Cyber

May 18, 2021
By Robert K. Ackerman
Lt. Gen. Stephen G. Fogarty, USA, commander, U.S. Army Cyber Command, delivers the opening keynote in Episode Three of the TechNet Augusta Virtual Solutions Series.

It will be the human factor that determines the victor in the next Army cyber conflict.

Cyber Gunslingers Defend Key Military and National Assets

By Kimberly Underwood
The 67th Cyberspace Wing of the U.S. Air Force is examining the concept of software factory-as-a-service that could aid in cyber space operations, reports Wing Commander Col. Jeffrey Phillips, USAF.

Wing leader sees success in helping to digitally protect weapons and conduct cyber operations.

CISA: Do Not Pay Ransomware

May 13, 2021
By Kimberly Underwood
Making ransom payments in cyber attacks only fuels the business model of malicious actors, warns the acting director of the Cybersecurity and Infrastructure Security Agency, Brandon Wales, speaking to reporters on May 13.

Federal cybersecurity agency works to confront and protect against ransomware activity.

President Biden Issues Cybersecurity Executive Order

May 13, 2021
By Kimberly Underwood
The new cybersecurity executive order from the White House calls for the federal government’s increased use of multifactor authentication, encryption, endpoint detection response, breach logging, zero-trust architecture and cloud computing, according to a senior administration official. Credit: Shutterstock/Andrea Izzotti

Measure aims to address large-scale adversarial attacks to the government and critical infrastructure.

New Service Academy Proposal Puts Focus on Building Cyber Workforce

May 13, 2021
By Beverly Cooper
Credit: Shutterstock/insta_photos

A digital academy similar to service academies would enhance leadership and education in the cyber realm.

Taking the First Steps for Privileged Access Management

April 28, 2021
Getting privileged access management right involves making sure the right security tools are in place and determining that they are easy to use and can interoperate with legacy software and systems, says Ross Johnson, director of federal sales for Thycotic Software Ltd. Credit:Shutterstock

Assessing what’s on a network helps with security audits.

DISA and JFHQ-DODIN's Orchestrated Response to SolarWinds

April 20, 2021
By Kimberly Underwood
Leaders from the Defense Information Systems Agency and the Joint Force Headquarters Department of Defense Information Network, including Gen. Garret Yee, Gen. Paul Fredenburg and Joe Wassel, found that the close working relationship of the two organizations was crucial in responding to the SolarWinds malware attack.

The organizations relied on their 24/7 cyber operations, supply chain management and partnerships.

Trusting Zero Trust Architecture

April 20, 2021
Zero trust architecture isn’t a single architecture, nor is it a single solution that can be purchased, but an interrelated set of old and new technologies and methods working together, said Don Maclean, chief cybersecurity technologist for DLT Solutions.

Getting the cybersecurity method right is more complex than it seems.

Helping DOD Agencies Move to New Tech

April 19, 2021
Industry can help the DOD with complex technology acquisition and deployment projects by providing services and expertise, said Dana Barnes, senior vice president of public sector at Palo Alto Networks. Credit: Shutterstock

Industry partnerships aid acquiring, implementing next-generation systems.

Plan Now to Secure 5G, Says Government Expert

April 9, 2021
By Robert K. Ackerman
A communications tower for military 5G rises above a forest. Several challenges loom as the U.S. Defense Department strives to implement 5G into the force. Credit: M.Moira/Shutterstock

Significant challenges lie ahead if 5G is to be harnessed successfully for defense operations.

CMMC Industry Advisory Council Announced

April 6, 2021
Posted by: George I. Seffers
A newly formed industry advisory council will allow small and large businesses to provide feedback on the CMMC. Credit: Gorodenkoff/Shutterstock

The industry advisory council will provide feedback, input and recommendations for implementing the CMMC.

U.S. Cyber Command Saw 'Unique' Challenges in 2020

March 25, 2021
By Kimberly Underwood
Adversaries are no longer merely launching attacks from their part of the world, says Gen. Paul Nakasone, USA, commander, U.S. Cyber Command, testifying before Congress on March 25. “They can come in the United States and use our infrastructure, and there is a blind spot for us not being able to see them,” he warns.

The command’s leader reports no compromise of DOD information networks from SolarWinds breach.

Adversaries Show the Way for CMMC

March 22, 2021
By Robert K. Ackerman
Advanced hacks such as the recent Solar Winds event are pushing the limits of CMMC standards. Credit: ozrimoz/Shutterstock

Hackers and other malevolent cyber denizens are helping outline the path to Cybersecurity Maturity Model Certification.

Air Force Aims for Enterprise Information System

March 10, 2021
By Robert K. Ackerman
U.S. Air Force Chief of Staff Gen. Charles Q. Brown, USAF, looks on in a demonstration of how to fix code in minutes as part of the Air Force's Kessel Run. The Air Force is building an information enterprise that will enable both users and shapers of data systems to access needed information from a single source. Credit: U.S Air Force

The most important cloud for the Air Force will be the one that hosts vital information for all airmen and guardians.

Innovation Guides NSA-Hawaii

March 3, 2021
By Robert K. Ackerman
A double rainbow looms over the NSA/CSS Center in Oahu, Hawaii. The building is named after Capt. Joseph T. Rochefort, USN, whose team provided the key intelligence that helped win the 1942 Battle of Midway. The agency is looking to industry and academia for innovations vital to its changing mission. Credit: NSA/CSS

The NSA/CSS in Hawaii is increasing its work with industry and academia to carry out its mission against a growing threat in the Indo-Pacific region.

Addressing the Cybersecurity Workforce Gaps

March 3, 2021
By Kimberly Underwood
Leaders discuss cyber workforce disparities during the AFCEATechNet Indo-Pacific conference on March 3.

Leaders offer ways to improve cyber training and workforce disparities.

Pages