Cyber Blog

We Lack a Plan for Responding to a National or Even Global Cyber Event

December 3, 2015
By Robert B. Dix Jr.

Previous attempts at developing a national cyber incident response plan have petered out. Now, with the threat greater than ever, government and industry must come together to draft a plan that addresses the myriad issues confronting cyber defense.

OMB’s Cybersecurity Implementation Plan Should Measure Agency Resilience

November 19, 2015
By Ray Rothrock and J. Wayne Lloyd

Following the distressing headlines that cataloged repeated cyber breaches of U.S. federal computer networks—some that compromised the personal data of millions of people—government officials have implemented a patchwork of safeguards to shore up vulnerabilities, including the identification of high value assets. An OMB memo gives agencies a multi-step plan, but it might not go far enough. 

Cyber Success Defined by Adversaries, Acquisition Obstacles

November 17, 2015
By Robert K. Ackerman

Hazards abound in safeguarding cyberspace, including the defense acquisition process. But some sacred cows may have to be slaughtered to help protect the defense network environment.

New Digital Devices Increase Cyber Vulnerabilities

November 17, 2015
By Robert K. Ackerman

The ubiquity of networked devices has opened up a host of new opportunities for hackers aiming at targets from medical records to automobile GPS systems.

Security Experts Gain on Hackers

November 17, 2015
By Robert K. Ackerman

Having proper cyber hygiene is helping close the gap between security measures and hacker activities, but new threats continue to emerge.

Improving Cybersecurity Requires Teamwork and Collaboration

November 2, 2015
By Robert B. Dix Jr.

Cybersecurity awareness is too important to be left to just one month of enhanced attention. Government, industry and nongovernmental organizations all can engage in just a few specific steps that would enhance cybersecurity significantly.

Small Defense Contractors Need Stronger Cybersecurity Practices

October 15, 2015
By Maria C. Horton

Small businesses doing work for the U.S. Defense Department pose serious cybersecurity concerns, in part because of their limited resources to invest in technical and practiced security measures, the U.S. Government Accountability Office stated in a recent report about small businesses cyber practices.

Time for the Government to Practice What It Preaches

October 5, 2015
By Robert B. Dix Jr.

Government not only has been lax in following its own cybersecurity standards but also has failed to set the right example for the public sector and provide the proper resources to enable broad-based cyber protection.

U.S. Defense Department Agrees to Educate Small Businesses on Cybersecurity

September 30, 2015
By George I. Seffers

The Office of Small Business Programs acknowledges that cybersecurity is an important and timely issue for small businesses and is considering incorporating cybersecurity into its existing outreach and education efforts

United States and China Reach Cyber Espionage Agreement

September 25, 2015
By George I. Seffers
President Barack Obama and President Xi Jinping of China hold a press conference at the Great Hall of the People in Beijing, China, last year. Today, the two announced a historic agreement designed to curb cyber aggression.

The presidents of the United States and China reach a historic agreement aimed at limiting cyber crime.

Cyber Hunting Looms as the Next Virtual Frontier

September 9, 2015
By Robert K. Ackerman

Security software soon may do more than just defend networks: it may reach out and engage the cyber intruder. But, this holds many pitfalls for those who would go after the cyber marauder.

Cybersecurity Is About Much More Than Conventional Information Sharing

August 28, 2015
By Robert B. Dix Jr.

The United States needs to adopt an information sharing model based on those of the National Weather Service and the Centers for Disease Control to address the changing nature of the cyberthreat.

Pursuing Cyber Active Defense for Corporations

July 27, 2015
By Robert Clark

Strong legal issues must be addressed before companies take cyber active defense into their own hands.

DHS Expands Cyber Crime Center

July 22, 2015
By George I. Seffers

New cyber crime facility provides enhanced operational and training capabilities to meet the growing cyber mission. 

The Bottom Line: We Saw Them Coming

July 14, 2015
Maryann Lawlor

The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...

Good Grief: Isn't Anyone Responsible Here?

July 13, 2015
By Dr. Wesley Kaplow

The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.

Employees Are Not the Weakest Link in Cyber

July 2, 2015
By Robert Clark

Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?

FBI Issues CryptoWall Ransomware Warning

June 30, 2015
By George I. Seffers

The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.

Speed Dating With DISA

June 18, 2015
By George I. Seffers

On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.

Commanding and Controlling the Cyber Domain

June 17, 2015
By George I. Seffers
Lt. Gen. James McLaughlin, USAF, deputy commander, U.S. Cyber Command, kicked off the second day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, during which military officials highlighted the importance of command and control in defending cyberspace.

Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.

Pages