Cyber Blog

Have Developers Become Overly Dependent on Dependencies?

August 8, 2016
By Marvin Marin

One often-overlooked aspect of software development is how much programmers rely on open source libraries and packages for prewritten functions. Using the method makes a new program dependent on the existence and availability of that particular module. If that dependency is not available or the code functionality is broken, the entire program fails.

When Hackers Corrupt GPS Data

August 3, 2016
By George I. Seffers
Corrupting GPS data can disrupt the power grid, says one expert at the AFCEA TechNet Augusta conference.

When a hacker talks about a novel way to disrupt the power grid, people listen. At least that was the case on day two of the AFCEA TechNet Augusta conference taking place in Augusta, Georgia.

Predicting the Cyber Future

August 3, 2016
By George I. Seffers

One of the biggest advances in the near future likely will be the convergence of major military networks into one unified Department of Defense Information Network (DODIN), predicts Ronald Pontius, deputy to the commanding general, U.S. Army Cyber Command and Second Army. And that network will be operated and maintained by Signal Corps soldiers.

Russia Employs Full Range of Information Warfare Capabilities

August 2, 2016
By George I. Seffers
Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence, speaks at TechNet Augusta on August 2, 2016.

The Russian Federation forces are using a wide array of cyber and electronic warfare capabilities unlike anything U.S. forces have faced in the past 16 years. Russia uses its sophisticated capabilities to detect, locate and eliminate enemy forces, according to Maj. Gen. Stephen Fogarty, USA, commander, U.S. Army Center of Excellence.

Researchers Develop Wireless Malware Detection Technique

August 1, 2016

The technique, known as Zero-Overhead Profiling, will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. 

Four Strategies the DOD Can Implement to Increase Cybersecurity

July 19, 2016
By Joe Kim

It wasn’t too long ago that the Defense Department embarked on a Cybersecurity Discipline Implementation Plan identifying specific tasks that department's IT personnel must perform to reinforce basic cybersecurity requirements identified in policies, directives and orders across the agency. The plan segments tasks into four key "lines of effort" to strengthen cybersecurity initiatives. Read on to learn what they are and if they'll work.

Does the Pokemon Go Craze Threaten Networks?

July 14, 2016
By Sandra Jontz

Do you play Pokemon Go? The craze surrounding the augmented reality game that blends modern technology with a hint of nostalgia has resulted in a lot of benefits, from getting people outdoors to striking up conversations with strangers. But security concerns cause the hair of cybersecurity experts and privacy practitioners to stand on end worse than Brock’s.

U.S. Army's Cyber Quest Underway in Georgia

July 14, 2016

The U.S. Army is testing how cyberwarriors adjust to morphing cyber threats and electromagnetic warfare (EW) attacks during its Cyber Quest 2016, an exercise now underway at the Cyber Center of Excellence at Fort Gordon, Georgia. The event examines concepts and products that could influence future technologies and requirements as well as other Army and Defense Department exercises and experiments.

The Virtual Cybersecurity Frontier

July 12, 2016
By Bob Kimball

It’s no exaggeration to say the networking industry is going through a period of near-unprecedented change. The rapid adoption of software defined network (SDN) concepts and network functions virtualization (NFV) by global telecommunications service providers will continue to drive the rapid evolution and standardization, writes Bob Kimball, CTO for Ciena Government Solutions.

Cyber Readiness Means First Building the Work Force

June 8, 2016
By Sandra Jontz

The world needs at least 1.5 million cybersecurity professionals who do not exist—a labor shortage created by the increase in frequency and severity of cyber attacks and employers all fishing from the same pond, said Michael Cameron, vice president for business development, cyber and cybersecurity at Leidos, during the NITEC 2016 cyber conference.

Government Framework Offers Cybersecurity

June 6, 2016
By Beverly Mowery Cooper

A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach.

Cyber Lessons From The Panama Papers Hack

May 23, 2016
By Max Emelianov

By now, you've probably heard all about the so-termed Panama Papers, one of the largest data leaks in history with 11.5 million confidential documents leaked online. How did it happen—and what can we learn from it?

Making Innovation Relevant for Operational Success

May 19, 2016
By Beverly Mowery Cooper
Lt. Gen. Rhett Hernandez, USA (Ret.) (l), spoke with conference attendees about the importance of academic, industry and Army partnership for innovation in the cyber domain.

Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium.

Viewing Cyber Data in 3-D

May 11, 2016
By George I. Seffers
LinQuest's cyber solution allows analysts to view data in 3-D.

The 3-D Cyber Immersive Collaboration Environment (ICE) allows analysts to create a 3-D virtual world in which users are represented as avatars able to interact with big data analytics and/or real-time systems.

CyberFence Protects Critical Infrastructure

May 11, 2016
By George I. Seffers

CyberFence enables facility operators to monitor and address issues securely and remotely within the grid, saving time, energy and resources.

6 Steps to Increase Cybersecurity in the Age of Innocence

May 10, 2016
By Ray Rothrock

Let’s face it—we have a lot to learn about cybersecurity. Every day, we learn solutions have a short shelf life and that hackers have managed to stay a few steps ahead of those trying to track them down, shares RedSeal's CEO in a new blog.

Situational Awareness Will Inform Risk Management Decision Making

May 5, 2016
By Robert B. Dix Jr.

Cyber information sharing needs to be targeted to organizational needs throughout government and industry. Certain private sector groups are doing just that with their own form of cyber situational awareness.

Connectivity Mayhem: Ensuring Data Security in an IoT World

May 2, 2016
By Joel Dolisy

Thanks to the Internet of Things, just about everything that can be connected—from tanks to smartwatches—is connected. The Defense Department’s whole work force depends on thousands of devices that work off of disparate operating systems. The net result is a security risk nightmare for those who must secure government IT networks.

DISA Renames Field Command Organization

April 26, 2016

The Defense Information Systems Agency (DISA) has renamed the Continental United States Field Command to the DISA Global Operations Command to reflect the organization’s evolution as a global service provider.

Potential Adversaries Target U.S. Military Vulnerabilities

April 22, 2016
By Robert K. Ackerman

Russia and China have built formidable military forces by focusing on perceived U.S. vulnerabilities, particularly in cyberspace.

Pages