Cyber Blog

Aid Organization Turns to Augmented Reality

March 16, 2018
By Kimberly Underwood
As war brutally impacts the smallest citizens of the world, the International Committee for the Red Cross sought to develop an application to tell the story using augmented reality. Credit: Shutterstock/AGorohov

The International Committee of the Red Cross is harnessing high technology to show the impact of war on children.

Army Aims for Agile Acquisition of Offensive Cyber Weapons

March 7, 2018
By George I. Seffers
Lt. Gen. Paul Ostrowski, USA, speak at the AFCEA Army Signal Conference. Photo by Michael Carpenter

Army officials apply the streamlined IT box concept to acquire offensive cyber weapons.

MilCloud 2.0 Rollout Reaches for the Sky

March 12, 2018
By Kimberly Underwood
Now that DISA has provided provisional level 5 authorization for the use of milCloud 2.0, CSRA will be working to add users. Credit: CSRA Inc.

The Defense Information Systems Agency’s second venture into groundbreaking commercial service-based cloud infrastructure gets the green light.

Can You Secure Your Mobile Network Now?

March 2, 2018
By Maryann Lawlor
Image courtesy of BlackBerry

Check out the top 10 enterprise mobile security threats.

Cyber Worries Go Beyond Wi-Fi

February 28, 2018
By Beverly Cooper
Mike Engle of Bastille Networks, the winner of AFCEA DC Chapter’s shark tank, shows how everyday devices, such as remote controls, used at home or in business or government, could provide access points for hackers. Phoot Credit: Michael Carpenter

The winner of the AFCEA DC Chapter’s shark tank competition, Bastille Networks, addresses radio frequency emissions concerns for the Internet of radio.  

Cyber Technology Dives Into Innovation Showcase

February 21, 2018
By Robert K. Ackerman
Photo Illustration. Credit: Shutterstock/Dmitri Ma

A shark-tank approach seeks to provide innovative technologies for meeting government cybersecurity needs.

Big Data Can Lead to Big Problems

February 20, 2018
By Maryann Lawlor
The volume and variety of information that adversaries are surreptitiously collecting and analyzing from U.S. information systems requires new ways to detect enemies. Credit: Shutterstock

The U.S. government needs to invest in big data analytics to combat adversarial information pilfering and data digging.

Russia, Iran and North Korea Bolder in Cyber Realm

February 13, 2018
Posted By George I. Seffers

Cyber attacks by these nation-states are becoming more aggressive and more dangerous.

DOD Network Defense HQ Up and Running

February 1, 2018
Posted by Kimberly Underwood
The Joint Force Headquarters Department of Defense Information Network is fully operational, DOD reports. The network defense headquarters spent three years improving capabilities and building capacity to be able to secure and defend the military’s global network. DOD U.S. Strategic Command photo by Adam Hartman, of Petty Officer 2nd Class Ryan Allshouse using an intrusion detection system aboard the USS Ronald Reagan.

The cyber force arm that defends DOD’s 15,000 networks with 3 million users has achieved full operational capability.

Activity Trackers Releasing 'Too Much Information,' DOD Warns

January 31, 2018
By Kimberly Underwood
Army soldiers from the 3rd Infantry Division participate in a 4-mile division run at Fort Stewart, Georgia. The use of fitness trackers by some soldiers is inadvertently revealing their location and outline of military bases. Army photo by Sgt. Caitlyn Smoyer

DOD to study the implications of wearable exercise devices revealing "too much information" about service member locations and military bases.

Russia Could Cut Undersea Communications Cables

January 24, 2018
By Kimberly Underwood
Transatlantic communication cable systems such as the TAT-14, which connects the United States to France, the Netherlands, Germany, Denmark and the United Kingdom, are susceptible to attack, according to a recent report. Photo: Sprint Corp.

Undersea fiber optic cables—indispensable lines of communication between continents—may not be adequately protected.

Educators and Industry Share Outlooks on Cyber

January 18, 2018
By Julianne Simpson
Lt. Gen. Rhett Hernandez, USA (Ret.) (far r), AWest Point chair to the Army Cyber Institute and former commander of the U.S Army Cyber Command, moderates the "Cyber Educator Perspective & Priorities" panel alongside (l-r) Jim Yacone, director of federal operations, SANS Technology Institute; Michael Moniz, Circadence Corporation; David Snow, University System of Georgia; and Robert Quinn, St. Leo University.

Public-private partnerships will be key to the nation's success in cybersecurity.

An Adaptable Cyber Training Environment Is Essential to Success

January 18, 2018
By Julianne Simpson
ol. Paul Stanton, USA, commander, Cyber Protection Brigade, leads his subgroup during a workshop on research and development supporting the cyber training environment and tools at the Cyber Education, Research and Training Symposium.

Attendees at CERTS explored research and development supporting the cyber training environment, as well as solutions.

Services Face Similar Challenges But Take Different Approaches to Cyber

January 17, 2018
By Julianne Simpson
Cyber operators (l-r) Lt. Col. Barian Woodward, USMC; Lt. Col. Angela Waters, USAF; Lt. Col. Benjamin A. Ring, Ph.D., USA; Lt. Jr. Clovis Guevara, USCG; and Col. Paul T. Stanton, USA, panel moderator, address attendees at AFCEA's first Cyber Education, Research and Training Symposium.

Leaders from all five branches of the armed forces shared their perspectives on cyber education and training at an AFCEA symposium.

Federal Agencies Lag Behind in Shoring Up Email Security

January 18, 2018
Kimberly Underwood
Photo courtesy of Proofpoint

According to a recent report by Proofpoint, civilian federal agencies are slow to implement email security measures.

Cyberthreat Update: Efficiency Versus Security

January 17, 2018
By Julianne Simpson
“How can we make security effective and intuitive, yet usable?" Col. Andrew O. Hall, USA, director, Army Cyber Institute, asked attendees at AFCEA's first Cyber Education, Research and Training Symposium.

Col. Andrew O. Hall, USA, opened AFCEA’s first Cyber Education, Research and Training Symposium with a cyberthreat update.

Security Flaws in Computer Hardware Rock Industry

January 8, 2018
By Kimberly Underwood

Google researchers found vulnerabilities in modern computer processors made by leading chip companies; the problem represents a new class of possible attack.

Using Data for Good

December 22, 2017
By Kimberly Underwood
Veterans, active duty military and civilians welcome wounded warriors from all over the country to Huntsville International Airport in Alabama in commemoration of Veterans Week in November. Big data corporation Splunk is partnering with nonprofit veterans’ organizations to make a difference in getting veterans back to work. Army photo by Sgt. 1st Class Teddy Wade.

The holidays are a time for giving; one big data company is working to give back all year long.

Symposium to Connect Cyber Stakeholders with Solution Providers

November 30, 2017
By Julianne Simpson

AFCEA will host its first Cyber Education, Research and Training Symposium in January.

Report Calls for Better Data Sharing

November 8, 2017
By Maryann Lawlor

Automated systems leave out crucial cyberthreat details.