Cyber Blog

Industrial Base Requires Hyper Cyber Vigilance

August 10, 2020
By Maryann Lawlor
Ransomware attacks affect computers by encrypting all of the information on the device. The hackers then demand a ransom, usually paid in the form of crypto currency in return for the decryption key. U.S. Air Force Graphic by Adam Butterick

Significant questions about systems security exist, and the U.S. industrial base may not be able to address all of the challenges effectively.

COVID-19 Raises Resilience Red Flags

July 31, 2020
By Maryann Lawlor
Military and government leaders share their insights about cybersecurity challenges in the age of pandemics.

Technology experts discuss lessons the infection teaches about cybersecurity and resilience.

DISA Changes its Course Mid-Pandemic

July 17, 2020
By Robert K. Ackerman
Carlen Capenos, director, Office of Small Business Programs at DISA, participates in a virtual event. DISA moved quickly into telework based on ongoing operations and preparations already in place when the pandemic struck. Credit: DISA

DISA was ready when telework became the new normal. Now, many of its pandemic-related measures are going to remain long after the virus has passed into memory.

DOD to Offer Zero Trust Architecture This Year

July 15, 2020
By George I. Seffers
U.S. Defense Department officials intend to complete an initial zero trust architecture by year's end to improve cybersecurity, according to Vice Adm. Nancy Norton, USN, director, Defense Information Systems Agency.

Defense Department officials are developing an initial reference architecture for zero trust security.

LTG Fogarty Stresses Command-Centric NetOps

July 14, 2020
By George I. Seffers
The U.S. Army's concept of command-centric network operations gives commanders greater authority and responsibility for network operations and relies on big data to enable faster, more effective decision making. U.S. Army photo

Protecting critical data is paramount to the Army’s vision for command-centric network operations.

Air Combat Command Pursues Zero Trust Architecture

July 14, 2020
By Kimberly Underwood
Put simply, zero trust architecture (ZTA) is a "standard security door, and it’s a door that we can put in front of any application on our networks,” says Col. James Lotspeich, USAF, chief technology officer, Air Combat Command (ACC), Directorate of Cyberspace and Information Dominance (A6). The ACC is pursuing two ZTA pilot programs to improve cybersecurity. Credit: Shutterstock/Gomolach

The command has two pilot programs underway to employ the cybersecurity tool.

Internet Power and Control May Fall Simply Into China’s Lap

July 8, 2020
By Robert K. Ackerman
Credit: Shutterstock/metamorworks

The growth of the Internet itself may provide China with all the country needs to control it.

China's Long March to Telecommunications Primacy Picks up the Pace

July 2, 2020
By Robert K. Ackerman
Credit: Shutterstock/AlexLMX

Chinese telecommunications technology is not being welcomed with open arms around the world, but alternatives are few.

Army Commands Transfer DODIN Cyber Defense Duties

July 1, 2020
By George I. Seffers
The NETCOM Network Enterprise Center provided extended information technology support to many of the units deploying in support of Joint Task Force-Civil Support during the COVID-19 pandemic. U.S. Army Cyber Command has now delegated to NETCOM some its authorities for protecting Army portions of the Department of Defense Information Network. U.S. Army photo by Spc. Chafelmer Kroll

NETCOM is now in charge of the Army’s worldwide regional cyber centers, and Army Cyber Command can increase its focus on electronic warfare and information operations.

Technology Innovation Defines China’s Internet Grab

June 24, 2020
By Robert K. Ackerman
Credit: Shutterstock/Aleksandar Malivuk

China is offering the world a host of new telecommunications advances that would benefit Chinese companies and the country's leadership.

China's Proposed Internet Wrests Control From Users

June 18, 2020
By Robert K. Ackerman
Credit: Shutterstock/AlexLMX

China's efforts to change Internet technology could deny user's some of the strongest points of the global networking system.

Gen. Lyman Moves to Cyber Operations

June 17, 2020
Posted by Kimberly Underwood
Brig. Gen. Robert Lyman (USAF), director, Command, Control, Communications, and Cyber Systems Directorate, TCJ6, pictured center, speaks to Col. Mark Bradley, USAF, the TCJ6 deputy director at the U.S. Transportation Command (USTRANSCOM) on June 9. In July, Gen. Lyman will be joining the Pentagon as the Air Force’s assistant deputy chief of staff for Cyber Effects Operations, AF A2/A6. Photo by Michelle Gigante, USTRANSCOM/PA

The U.S. Transportation Command director will take his cyberspace expertise to the Pentagon.

Characteristics of a Cyber Marauder

May 28, 2020
By Kimberly Underwood
Characteristics of cyber actors give clues as to who poses a credible threat, experts say. Credit: Shutterstock/BABAROGA

Traits of digital bad actors reveal clues as to their operations.

Small Businesses Need Big Cybersecurity

May 27, 2020
By Maryann Lawlor
Cybersecurity experts emphasize it’s important for businesses, no matter their size, to have a plan to protect their data and systems as well as recover from an inevitable cyber attack. Credit: Den Rise/Shutterstock

Cybersecurity experts address these topics in an AFCEA International “Small Business Cybersecurity” white paper that includes best practices, recommendations and information resources.

Military Will Host Virtual Hack-A-Sat Event

May 19, 2020
Posted by Kimberly Underwood
Credit: Shutterstock/Pogorelova Olga

The Space Force announced that Space Security Challenge 2020: Hack-A-Sat would proceed as planned, but in a virtual format.

DISA Delivers Cyber Data During Pandemic

May 20, 2020
By George I. Seffers
Network data gains value for the Defense Department amidst an increase in attacks during the COVID-19 pandemic. Credit: solarseven/Shutterstock

Cyber attacks on the Defense Department networks are on the rise during the COVID-19 pandemic, spurring greater demand for network situational awareness data.

Ensuring Cybersecurity and Communications During COVID-19

May 4, 2020
By Kimberly Underwood
Four U.S. Air Force F-22 Raptors from the 1rst Fighter Wing line up before takeoff to conduct an adversary training sortie at Joint Base Langley-Eustis, Virginia on April 10. The Air Combat Command, which is responsible for the service's cyber mission, is examining the Air Force's cyber stance closely during the COVID-19 pandemic. Credit: U.S. Air Force photo by Nicholas De La Pena

The Air Force’s A-6 considers how to heighten cybersecurity in a work from home culture.

A Methodical Approach Works Best for Implementing CMMC

April 23, 2019
By Robert K. Ackerman
Panelists participate in a remote panel discussion hosted by AFCEA’s Virtual CMMC Symposium.

The CMMC should not be viewed by companies as a daunting endeavor, experts offer.

CMMC Measures Should Be Applied Early, Says Pentagon Official

April 23, 2019
By Robert K. Ackerman

Aspects of the multitiered CMMC security system, currently under development, could—and should—be adopted by companies even before the measures are formalized.

16th Air Force Adjusts to Operating During COVID-19

April 22, 2020
By Kimberly Underwood
Lt. Gen. Timothy Haugh, USAF, reports that the 16th Air Force reached full operational capability on April 21, during a virtual AFCEA Alamo luncheon event the same day. The general also spoke at the chapter’s ACE event in November.

Commander outlines the near-term priorities for the U.S. Air Force’s Information Warfare lead.

Pages