Cyber Blog

Air Force Proceeds with Spectrum Warfare Wing

November 18, 2020
By Kimberly Underwood
The Air Combat Command conducted successful cyber red team and penetration testing of its emerging cloud-enabled zero trust architecture, reports Lt. Gen. Chris Weggeman, USAF, speaking virtually on November 17 during the AFCEA Alamo Chapter's annual ACE conference.

The service’s first pursuit of such a wing is an answer to adversarial threats across the spectrum.

Digital Identity and Privacy Challenges

November 17, 2020
By Gregory Touhill and Arthur Friedman
Online privacy poses concerns for U.S. national security, businesses and private citizens. Credit: mtkang/Shutterstock

Protecting our personal data from misuse by corporations for financial gain or by governments—both foreign and domestic—is one of the major challenges that we all face. 

Experts Offer Cyber Strategy Tips

November 13, 2020
By Maryann Lawlor
The United States is preparing to enter a period when its infrastructure goes beyond being connected to or depending on cyberspace but instead will reside in cyberspace. Credit: Shutterstock/Gorodenkoff

Ideas for structure and policy improvements will boost data and network protection, say members of AFCEA International’s Cyber Committee in a white paper.

Vice Adm. Norton Transforms Big Ideas to Innovation Gems

November 9, 2020
By George I. Seffers
Leaders help their teams turn big ideas into diamonds, says Vice Adm. Nancy Norton, USN, DISA director and commander, JFHQ-DODIN. Credit: CoreDESIGN/Shutterstock

The outgoing DISA director reflects on leadership and fostering an environment for innovation.

Election Day Cybersecurity Holds

November 4, 2020
By Kimberly Underwood
Cybersecurity officials reporter few cyber attack interruptions on Election Day. Credit: Shutterstock/vesperstock

Despite adversarial threats, voting day goes off mostly without issues, cybersecurity officials say.

Army Unveils Four Pillars for Restructured G-6 Office

October 27, 2020
By George I. Seffers
Staff Sgt. Keila Peters, USA, an embedded noncommissioned officer within the Army C5ISR Center, conducts testing on equipment for the command post survivability effort during Network Modernization Experiment 20 at Joint Base McGuire-Dix-Lakehurst, New Jersey, July 27, 2020. The Army's new deputy chief of staff for G6 has laid out three pillars for his restructured office that include cyber, signal, electronic warfare and networking priorities. Credit: U.S. Army C5ISR Center photo/Jasmyne Douglas

The new office reaches initial operating capability.

Digital Era Leads to End of Binary Societies

October 26, 2020
By Robert K. Ackerman
Credit: Shutterstock/greenbutterfly with elements from NASA

One of the greatest ironies of digitization is that it is leading to the end of the binary era in society.

Government Aims To Shape 5G Characteristics

October 22, 2020
By Robert K. Ackerman
Credit: Shutterstock/Gagarin Iurii

By being an early adopter of 5G, the U.S. government hopes to be able to shape the new network.

The Army Evolves Its Formations for Cyber and Electronic Warfare

October 21, 2020
By Kimberly Underwood
From l-r, U. S. Army Sgt. Cody Conklin of the 4th Infantry Division from Ft. Carson, Colorado, and Sgt. Carl Higgins, USA, of the Intelligence, Information, Cyber, Electronic Warfare and Space, or I2CEWS, formation from Joint Base Lewis McCord, WA, detect and mitigate adversarial radio signals during Cyber Blitz 19. The I2CEWS have made good progress since then, in integrating advanced capabilities for multidomain operations. Credit: U.S. Army Combat Capabilities Development Command by Edric Thompson

The service is improving the organization of its cyber and electronic warfare personnel to support multidomain operations.

Data Grows Exponentially as a Major Player in Transatlantic Defense

October 16, 2020
By Robert K. Ackerman
Credit: Shutterstock/Aleksandar Malivuk

NATO and its members need a digital transformation, but not everyone is following the proper path.

Coronavirus Arms Military With Needed Tools

October 9, 2020
By Robert K. Ackerman
Credit: Shutterstock/Blue Planet Studio

COVID-19 is showing the way toward advanced information networking for civilian and military applications.

Lax Cybersecurity Threatens Missions

September 25, 2020
By Maryann Lawlor
Enterprisewide Risk Management (ERM) consists of the formal identification of major risks to the organization’s mission.

Cybersecurity is now a significant area of focus to senior leaders who have witnessed significant financial and reputational damage from adversaries.

DISA Readies Zero Trust Architecture for Warfighters

September 21, 2020
By Kimberly Underwood
The Defense Information Systems Agency is finishing its zero trust architecture to bring advances in security and data availability to warfighters. Credit: DISA

The Defense Information Systems Agency’s efforts will improve cybersecurity across the Defense Department.

The Interdependency of Identity Management and Zero Trust Architecture

September 11, 2020
By Kimberly Underwood
Once more of an operational and end-user experience tool, identity management has evolved to be a core aspect of cybersecurity, especially as part of zero trust architecture, say panelists Wednesday at the FedID conference.

Together, advanced security and identification verification methods can greatly elevate cyber security posture, experts say.

The Accuracy of Machines in Facial Recognition

September 9, 2020
By Kimberly Underwood
Credit: Shutterstock/MONOPOLY919

Researchers studying human-versus-machine facial recognition abilities over the long term come up with interesting results.

Rapid AI Development Demands Reform

September 4, 2020
By Robert K. Ackerman
The U.S. Government Accountability Office (GAO) is exploring the ramifications of a number of emerging disruptive technologies. Credit: GAO file photo

The pervasiveness of cyber requires the federal government to delve into regulatory issues, privacy concerns, economic competitiveness and security requirements.

Five Eyes Nations Release Cybersecurity Principles

September 1, 2020
Posted by Kimberly Underwood
The Five Eyes nations, including Australia, Canada, New Zealand, the United Kingdom and the United States, conducted extensive joint research on cyber breeches, culminating in an incident response playbook for the extended community of partners and network administrators. Credit: Shutterstock/Metamorworks

The joint advisory offers technical approaches to finding malicious activity on digital networks.

U.S. Army Conducts Final Cyber Blitz

August 24, 2020
By George I. Seffers
In recent years, the Army's Cyber Blitz experiment evolved well beyond just cyber, allowing the service to define the integration of cyberspace, electronic warfare, intelligence, space and information operations. Beginning next year, the experiment will be known as Multi-Domain Operations Live. Photo by Spc. Marcus Gresham, USA

The Cyber Blitz experiment has evolved into a multidomain operations exercise that beginning next year will be named Multi-Domain Operations Live.

If You Want to Support Warfighters, DISA Needs You

August 19, 2020
By George I. Seffers
Lori Ramirez, DISA’s director, workforce services and development, discusses the agency's efforts to recruit talented personnel by using virtual meeting and information sharing tools during the pandemic and beyond.

Virtual meeting tools help DISA reach more people and build stronger relationships with potential employees. 

Putting Cyber Software First

August 19, 2020
By Kimberly Underwood
Speaking at a virtual luncheon of AFCEA's Alamo Chapter on August 19, Lt. Col. John Priestly, USAF, program director and material leader, Unified Platform Program; and director, LevelUp CodeWorks Software Factory, San Antonio, shares that he is seeing initial success at the cyber software factory, which is less than a year old.

The Air Force software factory LevelUp Code Works aims for rapid development and delivery of cyber solutions.

Pages