Cyber Blog

China Posing Power Challenge

March 1, 2021
By Maryann Lawlor
China’s consolidated control its political mechanisms enables a unity of effort difficult to achieve in democracies. Credit: Shutterstock/Poring Studio

As China has modernized and gained strength, it appears to have sought mechanisms by which it can shape the international system and tools that afford it unique influence and privileges equal to—and perhaps surpassing—those of the United States.

DISA’s New Director Is Promoted to Lieutenant General

February 25, 2021
By Kimberly Underwood
The vice chairman of the Joint Chiefs of Staff, Gen. John Hyten, USAF (l), promotes Robert Skinner, USAF (r), to lieutenant general in advanced of Skinner’s move to lead the Defense Information Systems Agency and commander, Joint Force Headquarters Department of Defense Information Networks.

Robert Skinner prepares to return to Ft. Meade.

Army Extending Cyber Capabilities

February 17, 2021
By Robert K. Ackerman
U.S. Army soldiers support the U.S. Cyber Command. Army cyber activities are ramping up to reach across the Defense Department with improved capabilities. Credit: Steven Stover, 780th Military Intelligence Brigade

Army cyber efforts are reaching across the entire defense spectrum.

Closing All DOD’s Cyber Doors with Zero Trust

February 16, 2021
By Alex Chapin
Securing all of the entryways into U.S. Defense Department networks with zero trust is a multistep process, says Alex Chapin, vice president, McAfee Federal. Credit: mkfilm/Shutterstock

Access control will always be critical, but it is just the first important step of the zero trust journey.

Defense Leadership Warns of CMMC Deceit

February 11, 2021
By Robert K. Ackerman
Stacy Bostjanick (r), director of CMMC, Office of the Under Secretary of Defense (A&S), warns of CMMC certification companies that are not themselves certified in a discussion at AFCEA NOVA Intelligence Community IT Day.

Companies seeking CMMC certification help must beware of firms that are not yet certified.

CISA Conducts Exercise with MLB’s Cactus League

January 27, 2021
Posted by Kimberly Underwood
As part of its cybersecurity and critical infrastructure protection role, the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency, or CISA, recently conducted a virtual exercise with Major League Baseball's Cactus League. Credit: Shutterstock/Debby Wong

Effort aims to boost security during Major League Baseball’s spring training.

Cyber Defense Starts Locally

January 22, 2021
By Maryann Lawlor
While many cybersecurity recommendations have focused on the activities of the federal government, AFCEA Cyber Committee members recognize the role of state and local authorities in information security. Credit: Shutterstock/ESB Professional

In the second of its Strengthening the Nation’s Cybersecurity Strategy white paper series, AFCEA’s Cyber Committee shares recommendations about improving state and local cybersecurity.

U.S. Civil Unrest May Move into Cyber Realm

January 13, 2021
By Kimberly Underwood
Cybersecurity experts warn of possible growing cyber risks from domestic unrest. Credit: Shutterstock/Sergey Nivens

Cybersecurity experts warn that the destructive fervor could shift into the digital environment.

Defense Digital Service and HackerOne Initiate Third ‘Hack the Army’ Bug Bounty Challenge

January 6, 2021
Posted by Julianne Simpson
Credit: Shutterstock/Aleksandar Malivuk

The Defense Digital Service (DDS) and HackerOne announced the launch of DDS’s eleventh bug bounty program with HackerOne.

Sponsored: Consumer Apps and the Rise of Weaponized Data

December 23, 2020
By Harvey Boulter
Shutterstock/Thitichaya Yajampa

Experts have issued fresh warnings to U.S. citizens over the enormous amount of sensitive, personal information being captured and weaponized by the country’s adversaries.

Government Agencies’ Cyber Breach Expected

December 30, 2020
By Kimberly Underwood
When the GAO performs cybersecurity-related audits and reports its findings, it provides key recommendations to agencies to improve their networks and information technology from risks. Illustration by Chris D’Elia based on images from GAO Reports and lurri Motov/Shutterstock

The GAO investigates possible weaknesses or cybersecurity gaps and makes key recommendations to rectify problems. In some ways, it saw the latest cyber breach coming.

EU Releases New Cyber Strategy for Digital Decade

December 17, 2020
Posted by: George I. Seffers
The European Union's new Cybersecurity Strategy aims to safeguard a global and open Internet, while at the same time offering safeguards, according to a published announcement. Credit: mixmagic/Shutterstock

The new strategy could allow the EU to step up leadership on international norms and standards in cyberspace, and to strengthen cooperation with partners around the world.

Troubling Cyber Attack Necessitates Enhanced Federal Coordination

December 17, 2020
Posted by Kimberly Underwood
The extent of the global cyber attack by purported Russian threat actors has the U.S. government forming a new group to provide a coordinated response. Credit: Shutterstock/Alexander Limbach

Government departments form response group to battle “significant and ongoing” cybersecurity attack.

DISA Exploring Quantum-Resistant Cryptography

December 4, 2020
By George I. Seffers
With U.S. adversaries expected to be using quantum computing technologies in the next several years, officials at the Defense Information Systems Agency are exploring quantum-resistant technologies.Credit: metamorworks/Shutterstock

DISA officials believe foreign adversaries could own quantum computers within seven years and are exploring quantum-resistant technologies to protect DOD networks.

Know Your Knowledge

December 3, 2020
By Robert K. Ackerman
A Prandtl-M prototype is air launched by a Carbon Cub aircraft in a NASA test to simulate the flight conditions of the Martian atmosphere. The conventional aircraft in the Earth’s atmosphere is used to test a prototype interplanetary probe to glean knowledge that would be applied millions of miles distant. Credit: NASA imagery

Establishing a knowledge management strategy and organization is vital both for effective operation and for innovation.

Diversity-Bred Innovation Offers Pandemic Cybersecurity

December 2, 2020
By Robert K. Ackerman
Credit: metamorworks/Shutterstock

Sometimes, it takes a village of diverse thinkers to secure cyberspace.

DODIN Takes a Holistic Approach to Its Defense

December 2, 2020
By Robert K. Ackerman
Brig. Gen. Paul Fredenburgh III, USA, is the deputy commander, JFHQ-DODIN.

The Joint Force Headquarters-Department of Defense Information Network (JFHQ-DODIN) defends itself against new adversarial challenges on a daily basis.

Defense Experts Plan More Agile Spectrum Use

December 1, 2020
By Robert K. Ackerman
U.S. Marines conduct a routine check up on an AN/TPS-59 radar. New agile spectrum efforts by the Defense Information Systems Agency (DISA) aim to allow more efficient spectrum use on the battlefield while sharing spectrum with civilian bandwidth users. Credit: U.S. Marine Corps photo by Lance Cpl. John Hall, USMC

Agile spectrum is the catchphrase for using bandwidth efficiently enough to share with civilian applications. DISA is striving toward that with three efforts.

Public Safety Communications Enterprise Takes Shape

December 1, 2020
By Robert K. Ackerman
Credit: Shutterstock/Golden Sikorka

A broad effort seeks to link military and public emergency service networks with an automated approach.

Doing Things Differently at DISA

December 1, 2020
By Kimberly Underwood
Vice Adm. Nancy A. Norton, USN, director of the Defense Information Systems Agency (DISA) and commander, Joint Force Headquarters Department of Defense Information Network, reports that the interagency and international partnerships DISA has forged have strengthened the protection of critical assets around the world. Adm. Norton was the opening keynote speaker December 1 at AFCEA TechNet Cyber Conference, being held virtually through December 3.

The combat support agency seeks to drive innovation as it focuses on cybersecurity, infrastructure modernization and enterprise communications.

Pages