Cyber Blog

U.S. Army Introduces Cyber Fast Track for Civilians

February 13, 2017
The U.S. Army is rolling out a direct commissioning program for the cyber career field that would allow qualified civilians to bypass prerequisites to become an officer.

The U.S. Army is responding to the high demand for cyber experts with a new program that could let qualified civilians be commissioned directly into the service with a rank up to colonel. The Defense Department also is looking into whether the idea could work for the other services.  

 

3rd Annual Florida CyberThon Draws More Students Than Ever

February 14, 2017
By Tony Ferguson
Florida-based students participated in the third annual CyberThon challenge in January.

The third annual CyberThon event drew in more students than ever, providing hands-on cybersecurity, defense training to students of many ages who worked to defeat simulated cybersecurity threats to an online banking network. Students from dozens of Florida schools participated in the challenge hosted by AFCEA's Pensacola "Blue Angels" Chapter.

Trump Administration Should Read and Heed Obama Cyber Report

January 31, 2017
By Ray Rothrock
Image credit: www.bluecoat.com

As the nation deals with intelligence reports of Russian hacks of the U.S. presidential election, some of us in industry are pondering how President Donald Trump will tackle cybersecurity issues. He already has a good road map. In December, the Commission on Enhancing National Cybersecurity issued its “Report on Securing and Growing the Digital Economy.” It is high time the executive branch dug deeply into cybersecurity issues, writes RedSeal's Ray Rothrock.

Army Cyber Center of Excellence Requests Capability Research

January 17, 2017
By Julianne Simpson

The Army Cyber Center of Excellence is requesting research papers that address specific areas that answer learning demands or capability gaps that inhibit operational force effectiveness or efficiency.

Hillary Isn't Alone In Using a Personal Device for Work

January 6, 2017
As many as 40 percent of federal agency employees disregard mobile device policy.

The security risk from personal devices is much larger than policies alone can control.

 

Greater Integration Across the EMS Needed for Battlefield Dominance

December 20, 2016
By Capt. Kenneth Parks, USN (Ret.)

There’s no disputing technology’s role in the rapidly changing face of modern warfare. The convergence of commercial services with military applications, such as delivery of real-time data from anywhere using various devices, has changed what constitutes a combat environment. The U.S. military seeks to define a strategic approach to these converged operations. Time is of the essence, writes Kenneth Parks of Harris Corporation. 

Farewell to Hale, the Chief

December 15, 2016
By David E. Meadows

Richard Hale, the Defense Department chief information security officer, has retired after a long and distinguished career in public service. He will be missed, but he leaves a legacy of others following his model.

ZeroPoint Earns Mega Points with DHS

December 13, 2016

The Department of Homeland Security Science and Technology Directorate’s Homeland Security Advanced Research Projects Agency has announced that ZeroPoint, an exploit detection and analytics tool, has spun off as a startup company called ZeroPoint Dynamics.

Defense Department Launches 'Hack the Army' Bug Bounty Program

Hackers, take your mark. Building on the successes of the U.S. Defense Department’s “Hack the Pentagon” bug bounty program launched earlier this year, the Army now launches its own challenge. it’s now the Army’s turn.

Halvorsen Offers a Different Take on the Insider Threat

November 17, 2016
By George I. Seffers
Terry Halvorsen, U.S. Defense Department chief information officer, addresses the crowd at AFCEA TechNet Asia-Pacific. Photo by Bob Goodwin

Terry Halvorsen, U.S. Defense Department chief information officer, told the AFCEA TechNet Asia-Pacific audience he is concerned about the cyber threat posed by insiders, but he also warned against limiting employees’ sense of freedom.

What’s the Most Deadly Cyber Attack?

November 17, 2016
By George I. Seffers
Experts debate whether a cyber attack against common information systems or industrial control systems would be more lethal. Photo by Bob Goodwin

U.S. military and civilian experts on protecting critical infrastructure control systems debated whether a cyber attack on common information systems or on industrial control systems would be more deadly in response to an audience question at the AFCEA TechNet Asia-Pacific conference in Honolulu.

Operational Challenges in the Cyber Domain

November 16, 2016
By George I. Seffers
A panel discusses challenges in cyber domain at AFCEA TechNet Asia-Pacific in Hawaii. Photo by Bob Goodwin

Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities. Speaking at AFCEA TechNet Asia-Pacific, a panel of cyber experts agreed that the authorities to conduct cyber operations—along with policies, doctrine, tactics, techniques and procedures—still need to be defined even as technology advances rapidly.

Building Trust in the Cyber Era

November 15, 2016
By George I. Seffers
Panelists at TechNet Asia-Paciifc 2016 discuss the need for trust in the cyber domain. Photo by Bob Goodwin

Trust—or a lack thereof—is one of the biggest impediments to information sharing among coalitions and partner nations, according to a panel of experts speaking at the AFCEA TechNet conference in Honolulu. Randy Cieslak, chief information officer for the U.S. Pacific Command, led the panel. He described cyber as a two-edged sword available to both good guys and bad.

Defeating Enemies at the Speed of Cyber, Not Speed of Budgets

November 2, 2016
By Sandra Jontz
Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force, delivers the luncheon keynote during MILCOM 2016. Photo by Mike Carpenter

The military that can control and deny access to and use of the electromagnetic spectrum will be the victor of the next war, predicts Maj. Gen. Earl Matthews, USAF, (Ret.), former director of cyberspace operations and chief information security officer for the Air Force. Attaining supremacy within that crucial domain should be driving emerging technologies that will give the U.S. military the technical overmatch on the battlefield.

New Era of Complex Military Operations Brings Cyber Concerns to Forefront

November 1, 2016
By Sandra Jontz
Lt. Gen. Alan Lynn, USA, director of DISA and JFHQ-DODIN, addresses cyber-based network issues at MILCOM 2016 in Baltimore. Photo by Mike Carpenter

Today’s young soldiers don’t want cutting-edge mobile technology in their warfighting platforms; they want that to be their warfighting platforms, says Lt. Gen. Alan Lynn, USA, director of the Defense Information Systems Agency, or DISA. He spoke Tuesday on the inaugural day of MILCOM 2016. This year's theme, Securing Communications at the Speed of Cyber, digs into the competing priorities of speed, security and cost amid emerging challenges. 

Simple Steps for Social Media Security

October 26, 2016
By Julianne Simpson
Privacy and security settings exist for a reason. Learn about and use the privacy and security settings on social networks.

Social networks are a great way to stay connected with others, but users, particularly millennials, should be wary about how much personal information they post.

Millennial Cyber Behaviors Threaten Federal IT Systems

October 25, 2016
By Sandra Jontz

Millennials could just pose as grave a cybersecurity risk to enterprise networks as cyber criminals, according to one recent study. With more of them entering the federal workplace, they bring along technology preferences and bad behavior that threaten security of federal IT systems, according to cybersecurity developer Forcepoint.

Cyber Attacks Temporarily Shut Down Several Popular Sites

October 21, 2016

Major websites such as Twitter, Spotify, Amazon—and AFCEA International and SIGNAL Media—fell victim to successive massive distributed denial of service (DDoS) attacks on Friday. The Internet traffic firm Dyn informed people of the cyber attack after the sites were shut down.

Plenty of Phish in Your Sea of Emails

October 19, 2016
By Julianne Simpson

Cyber criminals have become quite savvy in luring people to click on a link or open an attachment through spam and phishing attacks. Learn how to spot and avoid these cyber attacks with tips from the National Cyber Security Alliance.

NATO Launches Cyber Acquisition Reform Study

October 18, 2016

NATO Allied Command Transformation and the NATO Communications and Information (NCI) Agency have launched an independent project to research options for streamlining NATO’s cyber capability development and acquisition processes.

Pages