Cyber Blog

Data-Driven Framework Attacks the Cyber Monster

May 16, 2018
By Beverly Cooper
Credit: Shutterstock

Framework performs threat-based cybersecurity architecture assessments to ensure DOD leadership has the insight to make well-informed, prioritized cybersecurity investment decisions.

Leaders Push for Innovative Cyber Information Sharing

May 17, 2018
Kimberly Underwood
Panelists discuss partnerships in cyber warfare at the AFCEA Defensive Cyber Operations Symposium.

As the backstop for the nation’s cyber warfare, the military should look to more partnerships to improve its defenses.

Defending the DODIN

May 17, 2018
By Kimberly Underwood
Panelists at the Defensive Cyber Operations Symposium discuss directing change to organize the cyberspace warfighting domain.

Protecting the nation's military network is a nonstop, challenging job.

DISA Director Provides a 3D Outlook

May 15, 2018
By Kimberly Underwood
Vice Adm. Nancy Norton, USN, DISA director and commander of JFHQ-DODIN, speaks at the AFCEA Defensive Cyber Operations Symposium.

The agency is working toward driving innovation, delivering solutions and defending the cyber domain.

DISA Executive Emphasizes Innovation

May 15, 2018
By Kimberly Underwood
Anthony Montemarano, executive deputy director, DISA, speaks at the Defensive Cyber Operations Symposium.

As the Department of Defense is working to improve lethality, it is making the transition to fight in the domain of cyber.

Bug Bounty Offers Big Bucks

April 25, 2018
By Maryann Lawlor
Credit: ChromaWise/Shutterstock

Company challenge targets zero-day exploits that affect Windows, MacOS, iOS and Android.

Marines Delve into Advanced Information Technologies

April 20, 2018
By Kimberly Underwood
The Marine Corps is looking for advanced information technology solutions when it comes to data management, cloud, artificial intelligence and machine learning, Col. Stinson told the industry at the recent AFCEA International Potomac Quantico Chapter event.

To support a more lethal warfighter, the service looks to industry offerings along with improved internal policies to make it all happen.

Army Communicators Advance Agenda

April 5, 2018
By Robert K. Ackerman
Lt. Gen. Bruce T. Crawford, USA, Army G-6 and chief information officer, cites two major changes already bearing fruit as the Army aims for network modernization.

Two major changes already have taken hold as the Army strives to modernize its network.

SpaceX Gets the Green Light for Broadband Satellite System

April 2, 2018
By Kimberly Underwood
SpaceX, which is pioneering the ability to re-use rockets for launches, just obtained governmental approval for a new satellite-based broadband system. Photo courtesy of SpaceX.

The company will deploy 4,425 satellites for the new nongeostationary orbit system.

A More Cyber-Conscious Supply Chain Management

March 29, 2018
By Kimberly Underwood
The Army is learning lessons as it makes its way through cybersecurity vulnerability identification of its major weaponry, according to Col. Bryan Stephens (2nd from l), USA, director, Cyber Focal, Army System of Systems Engineering and Integration, at a recent AFCEA Aberdeen event and interview with SIGNAL Magazine.

The Army is strengthening its cybersecurity posture through a system of systems look.

Aid Organization Turns to Augmented Reality

March 16, 2018
By Kimberly Underwood
As war brutally impacts the smallest citizens of the world, the International Committee for the Red Cross sought to develop an application to tell the story using augmented reality. Credit: Shutterstock/AGorohov

The International Committee of the Red Cross is harnessing high technology to show the impact of war on children.

Army Aims for Agile Acquisition of Offensive Cyber Weapons

March 7, 2018
By George I. Seffers
Lt. Gen. Paul Ostrowski, USA, speak at the AFCEA Army Signal Conference. Photo by Michael Carpenter

Army officials apply the streamlined IT box concept to acquire offensive cyber weapons.

MilCloud 2.0 Rollout Reaches for the Sky

March 12, 2018
By Kimberly Underwood
Now that DISA has provided provisional level 5 authorization for the use of milCloud 2.0, CSRA will be working to add users. Credit: CSRA Inc.

The Defense Information Systems Agency’s second venture into groundbreaking commercial service-based cloud infrastructure gets the green light.

Can You Secure Your Mobile Network Now?

March 2, 2018
By Maryann Lawlor
Image courtesy of BlackBerry

Check out the top 10 enterprise mobile security threats.

Cyber Worries Go Beyond Wi-Fi

February 28, 2018
By Beverly Cooper
Mike Engle of Bastille Networks, the winner of AFCEA DC Chapter’s shark tank, shows how everyday devices, such as remote controls, used at home or in business or government, could provide access points for hackers. Phoot Credit: Michael Carpenter

The winner of the AFCEA DC Chapter’s shark tank competition, Bastille Networks, addresses radio frequency emissions concerns for the Internet of radio.  

Cyber Technology Dives Into Innovation Showcase

February 21, 2018
By Robert K. Ackerman
Photo Illustration. Credit: Shutterstock/Dmitri Ma

A shark-tank approach seeks to provide innovative technologies for meeting government cybersecurity needs.

Big Data Can Lead to Big Problems

February 20, 2018
By Maryann Lawlor
The volume and variety of information that adversaries are surreptitiously collecting and analyzing from U.S. information systems requires new ways to detect enemies. Credit: Shutterstock

The U.S. government needs to invest in big data analytics to combat adversarial information pilfering and data digging.

Russia, Iran and North Korea Bolder in Cyber Realm

February 13, 2018
Posted By George I. Seffers

Cyber attacks by these nation-states are becoming more aggressive and more dangerous.

DOD Network Defense HQ Up and Running

February 1, 2018
Posted by Kimberly Underwood
The Joint Force Headquarters Department of Defense Information Network is fully operational, DOD reports. The network defense headquarters spent three years improving capabilities and building capacity to be able to secure and defend the military’s global network. DOD U.S. Strategic Command photo by Adam Hartman, of Petty Officer 2nd Class Ryan Allshouse using an intrusion detection system aboard the USS Ronald Reagan.

The cyber force arm that defends DOD’s 15,000 networks with 3 million users has achieved full operational capability.

Activity Trackers Releasing 'Too Much Information,' DOD Warns

January 31, 2018
By Kimberly Underwood
Army soldiers from the 3rd Infantry Division participate in a 4-mile division run at Fort Stewart, Georgia. The use of fitness trackers by some soldiers is inadvertently revealing their location and outline of military bases. Army photo by Sgt. Caitlyn Smoyer

DOD to study the implications of wearable exercise devices revealing "too much information" about service member locations and military bases.

Pages